Biblio

Export 21377 results:
2013
Cuijpers, C.M.K.C.. "Legal Aspects of Open Source Intelligence – Results of the VIRTUOSO Project." Computer Law & Security Review 29, no. 6 29, no. 6 (2013): 642-653.
Shane, Scott, and Nicole Perlroth. "Legislation seeks to bar NSA tactic in encryption." New York Times (2013).
Lukyanov, Fedor. "Let it be … how it used to be." Ogonek (2013).
Letter from the Secretary-General addressed to the President of the Security Council., 2013.
Letter from the Secretary-General addressed to the President of the Security Council., 2013.
Letter from the Secretary-General addressed to the President of the Security Council on the appointment of Ms. Sigrid Kaag, Special Coordinator, OPCW/UN Joint Mission., 2013.
Clarke, Richard A., Michael J. Morell, Geoffrey R. Stone, Cass R. Sunstein, and Peter Swire. "Liberty and Security in a Changing World." Report and Recommendations of The President’s Review Group on Intelligence and Communications Technologies (2013): 81.
Orlov, Vladimir, and Alexander Cheban. "Life after Death: Will the Nunn-Lugar Program Give Way to New Partnership?" Russia in Global Affairs (2013).
Duvold, Kjetil, and Mindaugas Jurkynas. "Lithuania." In Handbook of Political Change in Eastern Europe, 125-166., 2013.
Live Blog: Syria crisis, UN chemical weapons team leaves Syria paving way for attack. Haaretz, 2013.
Skoczylis, Joshua J.. The local prevention of terrorism in strategy and practice: ‘Contest’ a new era in the fight against terrorism In School of Law,. Vol. PhD in Law. The University of Leeds, 2013.
Transformation, NATO Allied Com. Lock Your Shields and Brace for Impact., 2013.
Bright, Peter. "Locking the bad guys out with asymmetric encryption." Ars Technica (2013).
Lone Mujahid Pocketbook. Al-Malahem Media, 2013.
A Look at DEA Agent 'Kiki' Camarena's Murder. Fox News You Tube Channel, 2013.
Ginty, Roger Mac. "Look Who’s Talking, Dialogue and Conflict Transformation." Critical Studies on Terrorism 6, no. 1 (2013): 219.
"Looking Forward: U.S. National Security Beyond the Wars." In Conference organized by the Center for a New American Security, 56-63. Vol. 189 ., 2013.
Malta Police Force Organizational Chart., 2013.
Niemiec, Marcin, and Andrzej R. Pach. "Management of security in quantum cryptography." IEEE Communications Magazine 51, no. 8 (2013): 36-41.
Tagarev, Todor. Management Priorities of the Minister of Defence of the Republic of Bulgaria in the 2013 Caretaker Government In CSDM Views. Sofia: Centre for Security and Defence Management, 2013.
Prima, Edit, Yudho G. Sucahyo, and Zainal A. Hasibuan. "Mapping the certification authority for e-government procurement system into eGovAMAN framework." In International Conference on Advanced Computer Science and Information Systems (ICACSIS). Bali, Indonesia: IEEE, 2013.
Oppel, Richard, and Jess Bidgood. "Marathon Bombing Suspect, in First Court Appearance, Pleads Not Guilty." The New York Times (2013).
Zemmari, Reda, Martina Daun, Michael Feldmann, and Ulrich Nickel. "Maritime Surveillance with GSM Passive Radar: Detection and Tracking of Small Agile Targets." In 14th International Radar Symposium. Dresden, Germany, 2013.
Martial Law over Flood in Germany. Military Is Deploying In 3 States By Now. Investment-Watch, 2013.
McAfee Lab Threat Report: Third Quarter 2013. McAfee, 2013.

Pages