Biblio

Export 21377 results:
2009
Ratchev, Valeri. "Context Scenarios in Long-Term Defense Planning." Information & Security: An International Journal 23, no. 1 (2009): 62-72.
Continuation of the National Emergency with Respect to Iran In Presidential Documents., 2009.
Iorsh, V.I., I.E. Kryukov, and I.N. Antonenko. "Control of Infrastructure and Safety of Production Systems." Management Methods and Tools (2009).
Tapia, R.S.. "Converging on Business-IT Alignment Best Practices: Lessons Learned from a Dutch Cross-Governmental Partnership." In 2009 IEEE International Technology Management Conference (ICE). Leiden, Netherlands, 2009.
Dimitrov, Vladimir. Conversion of Process Flow Diagrams to Activity Diagrams In Thirty Eighth Spring Conference of the Union of Bulgarian Mathematicians. Borovetz, 2009.
Ho, Joshua. "Cooperative Mechanisms in the Malacca Straits." In International Maritime Security Conference. Singapore: International Maritime Security Conference, 2009.
Lynch, Dov. "The Corfu Process." In The Indivisibility of Security: Russia and Euro-Atlantic Security, 35 ff. Rome: NATO Defense College, 2009.
Henninger, A.J.. Corruption: 15 Afghan Ministers under Investigation; Bribes, Perks, Skimming., 2009.
Urbonas, Raimundas. "Corruption in Lithuania." Connections: The Quarterly Journal 9, no. 1 (2009): 67-92.
Corruption Perceptions Index results for 2008. Transparency International, 2009.
Council Decision of 6 April 2009 establishing the European Police Office (Europol)., 2009.
Zajas, Stanisław. "Countering Air Terrorism." Connections: The Quarterly Journal 8, no. 4 (2009): 1-10.
Kirk-Smith, Michael, and James Dingley. "Countering Terrorism in Northern Ireland: The Role of Intelligence." Small Wars and Insurgencies 20, no. 3–4 (2009): 551-73.
Staff, Joint Chiefs of. Counterinsurgency Operations In Joint Publication., 2009.
Hoffman, Bruce. "A Counterterrorism Strategy for the Obama Administration." Terrorism and Political Violence 21 (2009): 369-70.
Country Analysis Brief: China. U.S. Energy Information Administration, 2009.
Country Reports on Terrorism 2008. State Department, Office of the Coordinator for Counterterrorism, 2009.
Delamaire, Linda, Hussein Abdou, and John Pointon. "Credit card fraud and detection techniques: A review." Banks and Bank Systems 4, no. 2 (2009): 57 .
Delamaire, L., HAH Abdou, and J. Pointon. "Credit card fraud and detection techniques : a review." Banks and Bank Systems 4, no. 2 (2009): 57-68.
Tagarev, Todor. Crisis Management in a multilateral context In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2009.
Alutaibi, Khaled Shuraem. Critical Infrastructure Protection in Saudi Arabia: A Case on Petrochemical Industry Protection against Terrorist Attacks at Jubail Industrial City (JIC) In Diss. King Fahd University of Petroleum and Minerals., 2009.
Alutaibi, Khaled Shuraem. Critical Infrastructure Protection in Saudi Arabia: A Case Study on Petrochemical Industry Protection Against Terrorist Attacks at Jubail Industrial City. Dhahran, Saudi Arabia: King Fahd University of Petroleum & Minerals, 2009.
Lou, Eric Choen Weng, and Mustafa Alshawi. "Critical success factors for e-tendering implementation in construction collaborative environments: people and process issues." Journal of Information Technology in Construction (ITcon) 14 (2009).
Jackson, Richard, Marie Been Smyth, and Jeroen Gunning. Critical Terrorism Studies: A New Research Agenda. London: Routledge, 2009.
Lo, Nai Wei, and Kuo-Hui Yeh. "Cryptanalysis of Two Three-Party Encrypted Key Exchange Protocols." Computer Standards & Interfaces 31, no. 6 (2009).

Pages