Biblio
Export 21441 results:
Cyber War: The Next Threat to National Security And What To Do About It . New York: HarperCollins,, 2010.
Cyber War: The Next Threat to National Security and What to Do About It. New York: Harper Collins, 2010.
Cyber Warriors. The Atlantic, 2010.
Cybercrime in Nigeria." Business Intelligence Journal 3, no. 1 (2010).
"Cyberwar: The Next Threat to National Security and What to Do About It. New York, NY: Harper Collins, 2010.
Cyberwarfare: Surviving an Attack." Public Interest Report 63, no. 3 (2010).
"Dagestan: Russian Hegemony and Islamic Resistance in the North Caucasus. Armonk, NY: M.E. Sharpe, 2010.
Data Hiding Based on Compressed Dithering Images In Advances in Intelligent Information and Database Systems. Studies in Computational Intelligence. Vol. 283. Berlin, Heidelberg: Springer, 2010.
Data Protection Law and International Jurisdiction on the Internet." International Journal of Law and Information Technology 19, no. 3 (2010): 227, 239.
"D-Cloud: Design of a Software Testing Environment for Reliable Distributed Systems Using Cloud Computing Technology In 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing (CCGRID'10). Melbourne, Australia, 2010.
DDR in Peace Operations: A Retrospective. New York: United Nations, 2010.
"Decreto del Presidente del Consiglio dei Ministri 5 maggio 2010 (D.C.P.M. 5 maggio 2010) “Organizzazione nazionale per la gestione di crisi”." Gazzetta ufficiale – Official Gazette/Journal of the Italian Republic 139 (2010).
Defence Budgeting and Financial Management." In Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices, 63-79. Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2010.
"The Defence Industry as an Ally in Reducing Corruption." In Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices, 266-276. Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2010.
"Defence Institution Building – A Self-Assessment Kit. Geneva: : DCAF, 2010.
Defence Procurement." In Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices, 80-95. Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2010.
"Defending a New Domain: The Pentagon’s Cyberstrategy." Foreign Affairs (2010).
"Defending A New Domain: The Pentagon’s Cyberstrategy." Foreign Affairs (2010).
"Defending a new Domain: The Pentagon’s Cyberstrategy." Foreign Affairs (2010).
"Defending Against Cyber Attacks. NATO, 2010.
Defense Against Terrorist Program. NATO, 2010.
The Defense Planning Systems and Their Implications." Journal of Defense Resources Management 1, no. 1 (2010).
"Defense Report 2009. Sofia, 2010.
Defining Terrorism – Is One Man’s Terrorist Another Man’s Freedom Fighter?. Herzliya: International Institute for Counter-Terrorism, 2010.