Biblio

Export 21377 results:
2011
IAEA Mission Report: The Great East Japan Earthquake Expert Mission. Vienna: IAEA, 2011.
Ragnarsson, Jón Kristinn, and Alyson Bailes. "Iceland and Cyber-threats: Is it more than fear of fear?" Stjórnmál & Stjórnsýsla 1, no. 7 (2011).
Drabik, Krzysztof. "Idealistic and Realistic Typology of Peace." Connections: The Quarterly Journal 10, no. 3 (2011): 1-13.
Prins, Corien, Dennis Broeders, Henk Griffioen, Anne-Greet Keizer, and Esther Keymolen. IGovernment. Amsterdam: University Press, 2011.
Imarat Kavkaz. Ogon sviashchennogo jihada [The Caucasus Emirate. The Fire of Holy Jihad]., 2011.
Molodilo, Diana.. "The Impact of Civilian Control on Contemporary Defense Planning Systems: Challenges for South East Europe." In NAVAL POSTGRADUATE SCHOOL MONTEREY CA., 2011.
Yang, Tim Littler Y., Sakir Sezer, Kieran McLaughlin, and H.F. Wang. "Impact of Cyber-Security Issues on Smart Grid." In 2011 2nd IEEE PES International Conference and Exhibition on Innovative Smart Grid Technologies. Manchester, 2011.
Alomosh, Ahmad Falah, and Aref Al-Khattar. "Impact of Terrorism on the Freedom of Movement and Protection of Human Private Life in The Arab World." British Journal of Arts and Social Sciences 1, no. 1 (2011).
Mölling, Christian, and Sophie-Charlotte Brune. The Impact of the Financial Crisis on European Defence. European Parliament, Directorate General for External Policies, 2011.
Cheng, Zi-Yao, Yun Liu, Chin-Chen Chang, and Shih-Chang Chang. An Improved Protocol for Password Authentication Using Smart Cards., 2011.
Marrin, Stephen. Improving Intelligence Analysis: Bridging the Gap Between Scholarship and Practice. London: Routledge, 2011.
Lorenzi, Fabiana, Ana L.C.Bazzan, Mara Abel, and Francesco Ricci. "Improving recommendations through an assumption-based multiagent approach: An application in the tourism domain." Expert Systems with Applications Volume 38, Issue 12 38, no. 12 (2011): 14703-14714.
Kılaz, İlker, and Kadir Hayri. Improving the Transparency/Anti-corruption Efforts in Defense Procurement: Recommendations from Global Practices In 145 pp. Monterey, CA:: Naval Postgraduate School, 2011.
Taylor, Claire. In Brief: Parliamentary Approval for Deploying the Armed Forces. House of Commons Standard Note SN/IA/5908 (Lon¬don: House of Commons Library, 2011.
Ana, Jović-Lazić, Jelisavac-Trošić Sanja, and Jazić Aleksandar. "In the light of bilateral relations of OSCE Minsk group member countries." Medjunarodni problemi 63, no. 4 (2011): 583-612.
de Haan, Lisa. India at war with itself. Vol. Master in Arts in Conflict Studies & Human Rights. Utrecht University, 2011.
Individual Partnership Action Plan 2011–2013: Armenia. NATO North Atlantic Council, 2011.
M., Alfawas S.. Information Security Management: a case study of an information security culture. Queensland University of technology, 2011.
Tagarev, Todor, Ilian Alipiev, and Nataliya Ivanova. Information support requirements of the Ministry of Justice In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2011.
Giles, Keir. "‘Information Troops’—A Russian Cyber Command?" In 3rd International Conference on Cyber Conflict, 50. Tallinn: CCD COE Publications, 2011.
Initial Analysis of the Industrial Case Studies. Aniketos Deliverable 6.1, 2011.
Schowalter, Timothy D.. Insect Ecology: An Ecosystem Approach. 4th ed. London: Academic Press, 2011.
Schaefer, Robert W.. The Insurgency in Chechnya and the North Caucasus: From Gazavat to Jihad . Santa Barbara, CA: Praeger Security International, 2011.
LeBeau, John. "Intelligence and Counter Terrorism: Examining the Critical Tools of Secrecy and Cooperation." In Toward a Grand Strategy Against Terrorism, 195. Vol. New York: McGraw-Hill., 2011.
Achkoski, Jugoslav, Metodija Dojchinovski, and Vladimir Trajkovik. "An Intelligence Information System based on Service-Oriented Architecture: A Survey of Security Issues." Information & Security: An International Journal 27, no. 1 (2011): 91-110.

Pages