Biblio
Export 21400 results:
The 2015 Report on National and International Cyber Security Exer-cises: Survey, Analysis and Recommendations. Heraklion, Greece: ENISA, 2015.
2015 Year in Review. Facebook Newsroom, 2015.
About. Metamorphosis, 2015.
About Cyber Security Challenge UK. CESG, 2015.
About Enterprise Architecture Analysis Tool. KTH Royal Institute of Technology, 2015.
About Hedayah. Hedayah, 2015.
About the concept of ‘hybrid war’." Veche 5 (2015).
"About Us. United Nations Peacekeeping, 2015.
About Us (Financial Action Task Force). Financial Action Task Force, 2015.
Abusing the Internet of Things - Blackouts, Freakouts and Stakeouts. Sebastopol, CA: O’Reilly, 2015.
Access Control in Healthcare Information Management Systems Using Biometric Authentication." International Journal of Applied Environmental Sciences (IJAES) 10, no. 1 (2015).
"Additional Protocol to the Council of Europe Convention on the Prevention of Terrorism In Council of Europe Treaty Series. Riga, 2015.
Adjusting NATO’s Nuclear Posture." Federation of American Scientists (2015).
"Advanced Persistent Threat Hacking. McGraw-Hill Education, 2015.
Advancing Nursing Students' Knowledge Acquisition and Critical Thinking Abilities through Strategic Exposure to Simulation Clinical Training. Northcentral University, 2015.
AEK., 2015.
After Action Review – Kazakhstan NCO Symposium. Astana: Office of Military Cooperation in Astana, 2015.
After the Election: Fundamental Security Challenges Nigeria Must Face. Washington, D.C., 2015.
The Agency." The New York Times (2015).
"