Biblio
Export 21404 results:
Cyberspace 2025: Navigating the Future of Cybersecurity Policy. Microsoft Corporation, 2014.
Cybervetting: Internet Searches for Vetting, Investigations, and Open-Source Intelligence. Taylor & Francis Group, LLC, 2014.
CyberWar, CyberTerror, CyberCrime and CyberActivism: An In-depth Guide to the Role of Standards in the Cybersecurity Environment. IT Governance Publishing, 2014.
Dam-break dry granular flows: experimental and numerical analysis." Wseas Transactions on Environment and Development 10 (2014).
"Data Breaches Put Retail GCs in the Firing Line. New York: Law360, 2014.
Data classification using the Dempster–Shafer method." Journal of Experimental & Theoretical Artificial Intelligence 26, no. 4 (2014): 493-517.
"David Delight Plus In Operator's Manual. Canada: Mind Alive Inc., 2014.
De economische effecten van piraterij in Zuidoost-Azië. Vol. Master in de Maritieme Wetenschappen. Universiteit Antwerpen – Faculteit Toegepaste Economische Wetenschappen, Universiteit Gent – Faculteit Rechtsgeleerdheid, 2014.
Death from Above: Jihadist Virtual Networks Respond to Drone Strikes in Yemen. Jihadica.com, 2014.
Debating European Security and Defense Policy: Understanding the Complexity. Farnham, Burlington: Ashgate Publishing Company, 2014.
De-Conflicting Civil-Military Networks." In Network Topology in Command and Control: Organization, Operation, and Evolution. IGI Global, 2014.
"Deconstructing the Fragile City: Exploring Insecurity, Violence, and Resilience." Environment and Urbanization 26, no. 2 (2014): 345-58.
"Defense institution building: the dynamics of change in Georgia and the need for continuity of effort. Thesis : Monterey, California: Naval Postgraduate School, 2014.
Defense Policy and Reforms in Bulgaria since the End of the Cold War: A Critical Analysis." Connections: The Quarterly Journal 13, no. 2 (2014): 65-78.
"Defining a test automation system for mobile apps In Faculdade de Engenharia. Vol. Mestrado Integrado em Engenharia Informática e Computação. Universidade do Porto, 2014.
Deghosting method for multiple target tracking in a single frequency network." In 2014 International Radar Conference. Lille, France , 2014.
"Democratization’s Vicious Circle or How Georgia Failed to Change." Connections: The Quarterly Journal 13, no. 4 (2014): 67-74.
"Departments. Official site of the Ministry of Foreign Affairs of Georgia, 2014.
Deputies of the Minister of Defense. Ministry of Defense of the Republic of Armenia, 2014.
Derna, premier territoire de l’EI hors des frontières du ”califat” en Libye." Le Monde (2014).
"Designing and Building a Security Operations Centre. USA: Syngress, 2014.
Designing the Internet of Things. Chichester, West Sussex: United Kingdom: John Wiley and Sons, 2014.
Designing the Internet of Things: Part 1 — IoT Devices and Local Networks. EDN Network, 2014.
The Destabilization of Central Asia. A Repetition of the Arab Spring on Russia’s Southern Borders Is More than Possible." Voenno-promishleniy Kurier 6(524) (2014).
"Determining Employee Awareness Using the Human Aspects of Information Security Questionnaire (HAIS-Q)." Computers and Security 42 (2014): 165-76.
"