Biblio

Export 21403 results:
2016
Hunger, Iris, and Filippa Lentzos. "The Future of Biothreat Governance." In Biological Threats in the 21st Century. London: Imperial College Press, 2016.
Jalili, Duraid. "Future Strategic Priorities, for Professional Military, Education: A Practitioner Perspective." Defence-in-Depth (2016).
GDP per capita (current in US$) – Zimbabwe. World Bank, 2016.
Vanempten, Jean. "Geef Bewakingsagenten Nog Meer Bevoegdheden." De Tijd (2016).
Bjergene, Ann-Kristin. "General Challenges of Intelligence Service Reform." In Proceedings from the Third International Conference “Governance and Reform of State Security Services: Best Practices", 41-45. Kyiv, Ukraine, 2016.
General Data Protection Regulation., 2016.
Tagarev, Todor. "A Generic Reference Curriculum on Cybersecurity." Information & Security: An International Journal 35, no. 2 (2016): 181-184.
Gupta, Suneet K., Pratyay Kuila, and Prasanta K. Jana. Genetic algorithm for k-connected relay node placement in wireless sensor networks In Second International Conference on Computer and Communication Technologies. New Delhi, India: Springer, 2016.
Geographic Distribution of Cisco Networking Academies., 2016.
Slack, Jeremy, Daniel E. Martinez, Alison Elizabeth Lee, and Scott Whiteford. "The Geography of Border Militarization: Violence, Death and Health in Mexico and the United States." Journal of Latin American Geography 15, no. 1 (2016): 7-32.
Georgia. Freedom House, 2016.
Gotkowska, Justyna. The German Initiative for Arms Control: Time for Dialogue with Russia. Ośrodek Studiów Wschodnich, 2016.
Delcker, Janosch. Germany’s New Problem Border: Poland. Politico, 2016.
Bartles, Charles K.. "Getting Gerasimov Right." Military Review 96, no. 1 (2016): 30-38, quote on p. 34.
Chitadze, Nika. "Global Dimensions of Organized Crime and Ways of Preventing Threats at International Level." Connections: The Quarterly Journal 15, no. 3 (2016): 17-32.
Sawin, Janet. Global Security Brief #3: Climate Change Poses Greater Security Threat than Terrorism. World Watch Institute, 2016.
Komin, Michael, and Alexander Vileykis. "‘Good’ and ‘Bad’ Investments: Everything You Always Wanted to Know about Ukrainian Commanders but Were Afraid to Ask." Connections: The Quarterly Journal 15, no. 1 (2016): 57-71 .
Murgia, Madhumita, and Duncan Robinson. "Google Faces EU Curbs on How It Tracks Users to Drive Adverts." Financial Times (2016).
Lemon, Edward. Governing Islam and Security in Tajikistan and Beyond: The Emergence of Transnational Authoritarian Security Governance. Vol. PhD. Exeter: United Kingdom: University of Exeter, 2016.
Government Technology., 2016.
Lebichot, Bertrand, Fabian Braun, Olivier Caelen, and Marco Saerens. A graph-based, semi-supervised, credit card fraud detection system In Complex Networks & Their Applications V. COMPLEX NETWORKS 2016. Studies in Computational Intelligence. Vol. 693. Cham: Springer, 2016.
Maiti, Chinmay, and Bibhas Chandra Dhara. "A grayscale watermark technique using sub-sampling and singular value decomposition." In International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET). Chennai, India , 2016.
Zahid, Farhan. "Growing Evidence of Islamic State in Pakistan." Terrorism Monitor 14, no. 3 (2016): 3-5.
Growth of IT-specialists Quantity on the Separate Types of the Certification Programs. Monster Blog, 2016.
Guide to Cyber Threat Information Sharing In NIST Special Publication . Gaithersburg, MD: National Institute of Standards and Technology, 2016.

Pages