Biblio
Export 21401 results:
Vulnerability Analysis of Content Management Systems to SQL Injection Using SQLMAP." In IEEE, SoutheastCon 2018 . St. Petersburg, FL, USA, 2018.
"WannaCry, NotPetya, and Cyberwarfare’s Threat to Healthcare." IncideDigitalHealth (2018).
"Was ist Security Awareness?. Security Insider, 2018.
The WASH vulnerability of Algeria’s population and analysis of contributing factors." Crisis Management 17, no. 1 (2018): 11-21.
"Web Technologies Used in the Commercial Banks in Finland In 19th International Conference on Computer Systems and Technologies (CompSys-Tech'18). New York, NY, USA, 2018.
What is Hybrid Warfare?" Global Security Review (2018).
"What Makes a Terrorist." New York Review Daily (2018).
"What makes learning management systems effective for learning?" Journal of Educational Technology Systems 47, no. 2 (2018): 152-169.
"What Military Education Forgets: Strategy is Performance." War on the Rocks (2018).
"Where does a nation's wealth go? Evidence from a third world country"." Journal of Money Laundering Control (2018).
"White Book 2017. The Armed Forces of Ukraine . Kyiv: Ministry of Defence of Ukraine, 2018.
White Book 2017, The Armed Forces of Ukraine. Ministry of Defence of Ukraine, 2018.
Why You Need to Establish a Cyber Security Culture in Within Your Organization. Cytelligence, 2018.
Wildlife Crime and Security." In Transnational Crime and Global Security. ABC-CLIO, 2018.
" Worldwide Threat Assessment of the US Intelligence Community. Washington D.C: Director of National Intelligence, 2018.
XXXIV. On the Medulus of Elasticity of Air, and the Velocity of Sound." The Philosophical Magazine 52, no. 245 (2018): 214-216.
"’Zielone ludziki’ na Bałtyku? Spektakularna akcja fińskich służb. TVP Info, 2018.
Zimbabwe Demographics Profile 2018. Index Mundi, 2018.
"Đukić potpisao osnivanje Prave Crne Gore [Djukic Signed the Founding of True Montenegro]." Pobjeda (2018): 3.
Імітаційна модель поширення продукції психологічного впливу в соціальних мережах." Проблеми створення, випробування, застосування (2018).
"Анализа Система Националне Безбедности Републике Бугарске." Војно Дело 2 (2018).
"Бизнес и сигурност. София: Авангард, 2018.
Методи і засоби забезпечення виконання вимог до кібербезпеки систем на програмовній логіці In Комп'ютерні системи та компоненти. Vol. кандидат технічних наук. Національний технічний університет "Харківський політехнічний інститут", 2018.