Biblio

Export 21362 results:
2013
Big Data. MSIS Wiki, 2013.
Ishikawa, Tomoya. "Big Data Business to Kojin Jyoho Hogo [Big Data Business and Protection of Personal Data]." Asahi Judiciary (2013).
Takahashi, Haruo. Big Data Hosei no Kokusai Hikaku [Comparison of Legal Framework of Big Data]. KDDI Research Institute, 2013.
Block, Cobus. Bilateral Trade Between Xinjiang and Kazakhstan: Challenges or Opportunities?. China Policy Institute Blog, 2013.
Sharma, Ajay, and Deo Brat Ojha. "Biometric Template Security Using Code Base Cryptosystem." Information & Security: An International Journal 26, no. 2 (2013): 47-57.
BMZ. BMZ Strategy Paper – An Overview of the Role of ICT in German Development Cooperation In Schlüsseltechnologien für eine nachhaltige Entwicklung. Informations- und Kommunikationstechnologien (IKT), 2013.
Azinovic, Vlado. "Bosnia and Herzegovina and Terrorism 1996-2011: Defining the Threat, Devising Counterterrorism Strategy." In The Dangerous Landscape, 191-209., 2013.
Perez, Evan, Devlin Barrett, and Andrew Grossman. "Boston Bomb Clues Surface." The Wall Street Journal (2013).
Cullison, Alan. "Boston Bombing Suspect Was Steeped in Conspiracies." The Wall Street Journal (2013).
Gerstein, Josh. Boston Bombing Suspects’ Parents Granted Divorce in 2011. Politico.com, 2013.
Madden, Lance. "Boston Marathon Bombing Suspect No. 1 Tamerlan Tsarnaev Trained to Box for U.S." Forbes (2013).
S., Lysenko, Savenko O., A. Kryshchuk, and Y. Klyots. Botnet detection technique for corporate area network In Proceedings of the 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems. Berlin, DE: IEEE, 2013.
"Brahimi to Stay on as Syria Envoy after Russia-U.S. Bid." Al-Arabiya (2013).
Roell, Peter. Brazilian and European Perspectives on the Global Security Order In ISPSW Strategy Series: Focus on Defense and International Security. Institut für Strategie- Politik- Sicherheits- und Wirtschaftsberatung ISPSW, 2013.
Borger, Julian, and Ian Traynor. "Brazilian president launches ferocious attack on NSA spying." Guardian (2013): 4.
Armando, Alessandro, Gabriele Costa, and Alessio Merlo. Bring Your Own Device, Securely In 28th Annual ACM Symposium on Applied Computing, SAC’13. Coimbra, Portugal, 2013.
British Ambassador Jonathan Allen: Should I be an Optimist or a Pessimist for Bulgaria? In Speech. Foreign & Commonwealth Office, 2013.
Rühle, Michael. The Broader Context of NATO’s Nuclear Policy and Posture. Rome: NATO Defense College, 2013.
Raybourn, Tracey. Bucketization Techniques for encrypted databases: Quantifying the impact of Query Distributions In Graduate College of Bowling Green State University. Vol. Master of Science., 2013.
Sanger, David. "Budget documents detail extent of U.S. cyberoperations." New York Times (2013).
Bodnarova, Barbara. Budgeting Short Notice Military Deployment in Central and Eastern European Countries:Tthe Case of NATO Response Force. Centre for European and North Atlantic Affairs, 2013.
Ratchev, Valeri. Building Integrity in Defence: Role of Parliaments., 2013.
Building Resilience Against Terrorism: Canada’s Counter-Terrorism Strategy. Government of Canada, 2013.
World Bank. Building Resilience: Integrating Climate and Disaster Risk into Development. Washington, DC: World Bank, 2013.
Tagarev, Todor. Bulgaria’s contribution in the Development of NATO and EU’s Defence Capabilities (in Bulgarian) In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2013.

Pages