Biblio

Export 21403 results:
2016
Miloslavskaya, Natalia G.. Cybersecurity Culture as an Element of IT Professional Training. ResearchGate, 2016.
Minović, Adriana, Adel Abusara, , Vladimir Erceg, Predrag Tasevski, Vladimir Radunović, and Franziska Klopfer. Cybersecurity in the Western Balkans: Policy gaps and cooperation opportunities. Geneva: DiploFoundation, 2016.
Cybersecurity Information Sharing Act In CISA S.2588 - 113th Congress, S.754 - 114th Congress., 2016.
Mohideen, Feroze. The Cyber-Security State of our Nation: A Critique of South Africas Stance on Cyber-Security in Respect of the Protection of Critical Information Infrastructure In ICCWS 2016 11th International Conference on Cyber Warfare and Security ., 2016.
Dela, Piotr. "Cyberspace as the Environment Affected by Organized Crime Activity." Connections: The Quarterly Journal 15, no. 3 (2016): 55-64.
Libicki, Martin C.. Cyberspace in Peace and War. Naval Institute Press, 2016.
Sadiku, Matthew N. O., Adebowale E. Shadare, Sarhan M. Musa, and Cajetan M. Akujuobi. "Cyberterrorism." Journal of Multidisciplinary Engineering Science and Technology (JMEST) 3, no. 12 (2016).
McCain, John. Cyberwar – the only sphere, in which Russia is ahead of US. interview by CNN, reported by RT, 2016.
Balcerowicz, Boleslaw. Czym jest współczesna wojna?., 2016.
5. Meyers, Adam. Danger Close: Fancy Bear Tracking of Ukrainian Field Artillery Units. CrowdStrike, 2016.
Stoykov, Mitko. "DARI Report on the Results of National Expert Assessment of Institutional Capabilities to Countering Hybrid Threats." In International conference “Interagency and International Cooperation in Countering Hybrid Threats". Sofia, Bulgaria, 2016.
Kremer, Sibbeline. De Veiligheid van Interventie.(Gebrek aan) internationale interventie in Libië en Syrië (2011) in het kader van het defensief realism. Vol. BA Scriptie. Universiteit Utrecht,, 2016.
van Uhm, Daan. "De Verwevenheid Tussen de Onder- en bovenwereld in de Wildlife Handel." Cahiers Politiestudies 1, no. 38 (2016): 41-54.
Raval, Siraj. Decentralized Applications: Harnessing Bitcoin's Blockchain Technology . O'Reilly Media, Inc., 2016.
Brantly, Aaron Franklin. The Decision to Attack: Military and Intelligence Cyber Decision-Making. Athens, GA: University of Georgia Press, 2016.
Tzvetkov, Georgi. The Declared Withdrawal from Syria and Russia's Next Steps In CSDM Views., 2016.
Decree of the President of Ukraine No. 92/2016., 2016.
Dayton, Keith W.. "Dedication to Col. Nick Pratt." In Combating Transnational Terrorism, v. Sofia: Procon, 2016.
Bonneau, Joseph. Deep Dive: EFF’s New Wordlists for Random Passphrases. Electronic Frontier Foundation, 2016.
Goodfellow, Ian, Yoshua Bengio, and Aaron Courville. Deep Learning . MIT Press, 2016.
Moosavi-Dezfooli, Seyed-Mohsen, Alhussein Fawzi, and Pascal Frossard. Deepfool: a simple and accurate method to fool deep neural networks In IEEE Conference on Computer Vision and Pattern Recognition., 2016.
Kordowski, Mariusz, Bohdan Pac, Todor Tagarev, Antonín Novotný, Jaroslav Nad', and Tamás Csiki. Defence Resources Management System in Visegrad Group. Warsaw: National Centre for Strategic Studies, 2016.
Defense Institution Building. Washington, D.C.: Department of Defense, 2016.
Perry, Walter L., Stuart Johnson, Stephanie Pezard, Gillian S. Oak, David Stebbins, and Chaoling Feng. Defense Institution Building: An Assessment . Santa Monica, CA: RAND Corporation, 2016.
McNerney, Michael J., Stuart E. Johnson, Stephanie Pezard, David Stebbins, Renanah Miles, Angela OʹMahony, Chaoling Feng, and Tim Oliver. Defense Institution Building in Africa: An Assessment. RAND Corporation, 2016.

Pages