Biblio

Export 21377 results:
2013
Soldatov, Andrei, and Irina Borogan. "Russia’s Surveillance State." World Policy Journal (2013).
Upadhyay, Dadan. "Russia, Uzbekistan Agree to Join Hands to Meet Afghanistan Threats." Rossiyskaya Gazeta (2013).
Safronov, Ivan, Elena Chernenko, and Kabai Karabekov. Russia Will Arm Kyrgyzstan and Tajikistan. Kommersant Online, 2013.
"Russian Ambassador Assassinated in Abkhazia." The Washington Post (2013).
Russian Direct Investments Make up 39.5% of Foreign Direct Investments into Armenia’s Economy. ARKA News Agency, 2013.
Russian Federation foreign policy concept 2013. official website of the Russian Federation Ministry of Foreign Affairs, 2013.
Novruzova, Nilufar. Russia's Impact On Osh Conflict 2010 Through Kyrgyz Nationalism. Khazar University, 2013.
Kuznetsov, Boris. Russo-Georgian Rapprochement: A Light at the End of the Tunnel. Vienna: LandesvertidigungAkademie, 2013.
Mezhuev, Boris. "Saakashvili’s Regime Terrors Were Shown in the US Congress." Izvestia (2013).
Boyanov, Liuben. Savremennite informatcionni tehnologii v doma., 2013.
Cairns, George, Iftekhar Ahmed, Jane Mullett, and George Wright. "Scenario method and stakeholder engagement: Critical reflections on a climate change scenarios case study." Technological Forecasting and Social Change 80, no. 1 (2013): 1-10.
Benesch, Thomas, Johannes Goellner, Andreas Peer, Johann Hoechtl, and Walter Seboeck. "Scenario Space for Alternative Futures of Security Research." Information & Security: An International Journal 29, no. 2 (2013): 111-119.
Haass, Richard N.. "The Second American Century? It’s Already Here." Washington Post (2013).
Second Chief Information Officers Conference. NATO Communications and Information Agency, 2013.
Borger, Julian. "Secrets and threats – why hard drives were smashed." Guardian (2013): 4-5.
O'Callaghan, R. "Secular Theology and Noble Sacrifice: The Ethics of Michael Walzer's Just War Theory." Review of International Studies (2013).
Ibrahim, Mahmood Khalel, and Mohammed A. Jabbar Hamid. "Secure E-Government Framework: Design and Implementation." International Journal of Computer Science Engineering and Technology (IJCSET) 3, no. 5 (2013): 186-193.
Calvin], Wei-Dar Chen [. Secure e-Payment Portal Solutions Using Mobile Technologies and Citizen Identity Scheme In Department of Mathematics. Vol. Doctor of Philosophy. London: Royal Holloway, University of London, 2013.
Apiecionek, Łukasz, and Michał Romantowski. "Secure IP Network Model, Computational Method." Science and Technology 19, no. 4 (2013): 209-213.
Zakerolhosseini, Ali, and Morteza Nikooghadam. "Secure Transmission of Mobile Agent in Dynamic Distributed Environments." Wireless Personal Communications 70, no. 2 (2013): 641-656.
Özpek, Burak Bilgehan. "Securing energy or energising security: the impact of Russia's energy policy on Turkey's accession to the European Union." Journal of International Relations and Development 16, no. 3 (2013).
Barcikowska, Anna. Securing the Future of European Defense. Paris: EU Institute for Security Studies, 2013.
von Münchow, Sebastian. "Security Agencies and Parliamentary Committees of Inquiry in Germany: Transparency vs. Confidentiality." Connections: The Quarterly Journal 12, no. 4 (2013): 51-74.
National Institute of Standards and Technology. Security and Privacy Controls for Federal Information Systems and Organizations In Special Publication., 2013.
Masrom, Maslin, Edith AiLing Lim, and Sabariyah Din. "Security and Quality Issues in Trusting E-Government Service Delivery." In Managing Trust in Cyberspace., 2013.

Pages