Biblio

Export 21376 results:
2016
GDP per capita (current in US$) – Zimbabwe. World Bank, 2016.
Vanempten, Jean. "Geef Bewakingsagenten Nog Meer Bevoegdheden." De Tijd (2016).
Bjergene, Ann-Kristin. "General Challenges of Intelligence Service Reform." In Proceedings from the Third International Conference “Governance and Reform of State Security Services: Best Practices", 41-45. Kyiv, Ukraine, 2016.
General Data Protection Regulation., 2016.
Tagarev, Todor. "A Generic Reference Curriculum on Cybersecurity." Information & Security: An International Journal 35, no. 2 (2016): 181-184.
Gupta, Suneet K., Pratyay Kuila, and Prasanta K. Jana. Genetic algorithm for k-connected relay node placement in wireless sensor networks In Second International Conference on Computer and Communication Technologies. New Delhi, India: Springer, 2016.
Geographic Distribution of Cisco Networking Academies., 2016.
Slack, Jeremy, Daniel E. Martinez, Alison Elizabeth Lee, and Scott Whiteford. "The Geography of Border Militarization: Violence, Death and Health in Mexico and the United States." Journal of Latin American Geography 15, no. 1 (2016): 7-32.
Georgia. Freedom House, 2016.
Gotkowska, Justyna. The German Initiative for Arms Control: Time for Dialogue with Russia. Ośrodek Studiów Wschodnich, 2016.
Delcker, Janosch. Germany’s New Problem Border: Poland. Politico, 2016.
Bartles, Charles K.. "Getting Gerasimov Right." Military Review 96, no. 1 (2016): 30-38, quote on p. 34.
Chitadze, Nika. "Global Dimensions of Organized Crime and Ways of Preventing Threats at International Level." Connections: The Quarterly Journal 15, no. 3 (2016): 17-32.
Sawin, Janet. Global Security Brief #3: Climate Change Poses Greater Security Threat than Terrorism. World Watch Institute, 2016.
Komin, Michael, and Alexander Vileykis. "‘Good’ and ‘Bad’ Investments: Everything You Always Wanted to Know about Ukrainian Commanders but Were Afraid to Ask." Connections: The Quarterly Journal 15, no. 1 (2016): 57-71 .
Murgia, Madhumita, and Duncan Robinson. "Google Faces EU Curbs on How It Tracks Users to Drive Adverts." Financial Times (2016).
Lemon, Edward. Governing Islam and Security in Tajikistan and Beyond: The Emergence of Transnational Authoritarian Security Governance. Vol. PhD. Exeter: United Kingdom: University of Exeter, 2016.
Government Technology., 2016.
Lebichot, Bertrand, Fabian Braun, Olivier Caelen, and Marco Saerens. A graph-based, semi-supervised, credit card fraud detection system In Complex Networks & Their Applications V. COMPLEX NETWORKS 2016. Studies in Computational Intelligence. Vol. 693. Cham: Springer, 2016.
Maiti, Chinmay, and Bibhas Chandra Dhara. "A grayscale watermark technique using sub-sampling and singular value decomposition." In International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET). Chennai, India , 2016.
Zahid, Farhan. "Growing Evidence of Islamic State in Pakistan." Terrorism Monitor 14, no. 3 (2016): 3-5.
Growth of IT-specialists Quantity on the Separate Types of the Certification Programs. Monster Blog, 2016.
Johnson, Chris, Lee Badger, David Waltermire, Julie Snyder, and Clem Skorupka. Guide to Cyber Threat Information Sharing In Special Publication. National Institute of Standards and Technology (NIST), 2016.
Guide to Cyber Threat Information Sharing In NIST Special Publication . Gaithersburg, MD: National Institute of Standards and Technology, 2016.
Shoemaker, Dan, Anne Kohnke, and Ken Sigler. A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce 2.0 . Boca Raton, FL: CRC Press, 2016.

Pages