Biblio

Export 21376 results:
2014
Al-Aghbari, Anas, Othman Ibrahim, and Faisal Saeed. "E-Government Readiness Ranking and Challenges in Yemen." In 1st International Conference of Recent Trends in Information and Communication Technologies., 2014.
Egyptian ex-Defense Minister As-Sisi wins 96.91 % of presidential election votes. Vol. 3 June 2014. ITAR-TASS, 2014.
Lis, Andrzej. " E-learning w organizacjach wojskowych: doświadczenia sojusznicze i wnioski dla sił zbrojnych (E-learning in Military Organisations: Lessons from the Allies and Recommendations for the Polish Armed Forces)." Studia Ekonomiczne 199 (2014): 134-145 .
Siponen, Mikko, Adam Mahmood, and Seppo Pahnila. "Employees’ Adherence to Information Security Policies: An Exploratory Field Study." Information and Management 51, no. 2 (2014): 217-24.
Armando, Alessandro, Gabriele Costa, Alessio Merlo, and Luca Verderame. Enabling BYOD Through Secure Meta-market In 2014 ACM Conference on Security and Privacy in Wireless & Mobile Networks, WiSec’14. Oxford, United Kingdom, 2014.
Enclaves in Central Asia: The Post-imperial Chessboard. The Economist, 2014.
Tucker, Spencer C.. The Encyclopedia of the Wars of the Early American Republic, 1783–1812: A Political, Social, and Military History. ABC-CLIO, 2014.
Ganz, Aurora. Energy Security Issues: Is NATO Becoming a (Pivotal) Actor?. SciencesPo, Centre de Recherches Internationales, 2014.
Söhret, Mesut. "Enerjđ Güvenlđğđ Kapsaminda Nato’nun Ortadoğu Polđtđkasi." In International Energy and Security Congress. Turkey: Kocaeli University, 2014.
Söhret, Mesut. "Enerjđ Güvenlđğđ Kapsaminda Nato’nun Ortadoğu Polđtđkasi." In International Energy and Security Congress that took place at Kocaeli University. Turkey: Kocaeli University, 2014.
Engaging Men: The Journey Towards Gender Transformation. Plan, 2014.
England Coast Path: Improving Public Access to the Coast. Government of UK, 2014.
Pitrėnaitė-Žilėnienė, Birutė, Andrea Carosi, and Paolo Vallesi. "Enhancing Societal Resilience against Disasters: Engaging the Public via Social Technologies." Social Technologies 4, no. 2 (2014): 318-332.
ENISA. ENISA Threat Landscape 2014: Overview of current and emerging cyber-threats., 2014.
Monev, Veselin. Enterprise IT security metrics: Classification, examples and characteristics (in Bulgarian) In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2014.
Entropy definition / Дефиниция на Ентропия. Whatis.com, 2014.
Petrov, Valentyn. "Establishing a National Cybersecurity System in the Context of National Security and Defence Sector Reform." Information & Security: An International Journal 31 (2014): 73-77.
Baraković, Sabina. "Establishment of a CERT body in Bosnia and Herzegovina." In DCAF Young Faces 2014 – Cybersecurity Winter School for the Western Balkans. Geneva: DCAF, 2014.
Baraković, Sabina. Establishment of CERT Body in Bosnia and Herzegovina In DCAF Young Faces 2014 – Cybersecurity Winter School for the Western Balkans., 2014.
Ministry of Economic Affairs and Communication. Estonia, Cyber Security Strategy 2014-2017., 2014.
Estonian Ministry of Defence. Estonian Defence Force’s Cyber Range., 2014.
Monteiro, Agostinho dos Reis. Ethics of Human Rights. Dordrecht: Springer, 2014.
Ethics of Security and Surveillance Technologies. European Group on Ethics in Science and New Technologies, 2014.
The EU Integrated Political Crisis Response Arrangements in Brief. Council of the European Union, 2014.
The EU’s Association Agreements with Georgia, the Republic of Moldova and Ukraine. Brussels, 2014.

Pages