Biblio

Export 21377 results:
2012
Conclusions of the Council on the South Caucasus In 3149th Foreign Affairs Council Meeting. Council of the European Union, 2012.
Caforio, Giuseppe. "The Concreteness of Asymmetric War: Fragments of Experience." Connections: The Quarterly Journal 11, no. 3 (2012): 21-39.
Day, David J., Denys A. Flores, and Harjinder Singh Lallie. CONDOR: A Hybrid IDS to Offer Improved Intrusion Detection In 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications. Liverpool, UK: TrustCom , 2012.
Sue, Valerie, and Lois Ritter. Conducting Online Surveys . Thousand Oaks, CA: Sage Publications, 2012.
Johnson, Jeh Charles. The Conflict Against Al Qaeda and its Affiliates: How Will It End? In paper presented at the Oxford Union. Oxford, UK: Oxford University, 2012.
Sanger, David. Confront and Conceal: Obama’s Secret Wars and Surprising Use of American Power. New York: Crown Publishers, 2012.
Ekpo, E.E.. "Confronting the Realities of Corruption in Nigeria." In Corruption and Nigeria’s Underdevelopment, 46-67. Lagos: Serenity Press, 2012.
Consolidated Report. Organization for Security and Cooperation in Europe, Forum for Security Co-operation, 2012.
De Bruyne, Tom. ‘A constable marine’: De strijd tegen piraterij als case voor het veranderend veiligheidsdenken, Master in de criminologische wetenschappen. Vol. Master in de criminologische wetenschappe. Universiteit Gent, 2012.
Glazev, S. Y.. Contemporary Theory of Wave Length in the Economic Eevelopment., 2012.
Gunes, Cengiz. "Contesting Democracy and Pluralism: the Pro-Kurdish Political Parties in Turkey." In The Kurdish National Movement in Turkey: From Protest to Resistance, 154. New York: Routledge, 2012.
Ratchev, Valeri, Uwe Nerlich, and Todor Tagarev. Context Scenarios and Alternative Future EU Roles as a Global Security Actor In It4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2012.
Alipiev, Ilian. The control function in the draft laws on national security management, the intelligence, the military intelligence, and the national service for protection In CSDM Views. Sofia: Centre for Security and defence Management, 2012.
Anderson, David. Control Orders in 2011: Final Report of The Independent Reviewer on The Prevention of Terrorism Act 2005. London: The Stationery Office, 2012.
Fazlagic, Samir, Narcis Behlilovic, and Sasa Mrdovic. "Controlled Delegation of Signature in Workflow Systems." In 20th Telecommunications Forum (TELFOR). Belgrade, Serbia , 2012.
Cui, Shuguang, Zhu Han, Soummya Kar, Tung T. Kim, Vincent H. Poor, and Ali Tajer. "Coordinated Data-injection Attack and Detection in the Smart Grid: A Detailed Look at Enriching Detection Solutions." IEEE Signal Processing Magazine 29, no. 5 (2012): 106-115.
Brattberg, Erik. "Coordinating for Contingencies: Taking Stock of Post-9-11 Homeland Security Reforms." Journal of Contingencies and Crisis Management 20, no. 2 (2012): 86.
Counternarcotics Assistance: U.S. Agencies Have Allotted Billions in Andean Countries, but DOD Should Improve Its Reporting of Results. Washington, D.C.: GAO, 2012.
Hillebrand, Claudia. Counter-terrorism networks in the European Union: maintaining democratic legitimacy after 9/11., 2012.
Coverage of President Jonathan’s full speech on the occasion of the 2012 Armed Forces Remembrance Day., 2012.
The Criminal Procedural Law of Republic of Srpska. Official Gazette of Republic of Srpska, 53/12, 2012.
Dworzecki, Jacek. "Crisis Management System in Poland." The Science for Population Protection 4, no. 2 (2012).
Georgiev, Venelin. Critical Infrastructure and Supply Chain Protection: EU possible development paths and strategies In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2012.
Boyd, Danah, and Kate Crawford. "Critical questions for Big Data." Journal Information, Communication & Society 15, no. 5 (2012): 662-679.
Prezelj, Iztok, Erik Kopač, Uroš Svete, and Aleš Žiberna. "Cross-sectoral Scanning of Critical Infrastructures: From Functional Differences to Policy-relevant Similarities." Journal of Homeland Security and Emergency Management 9, no. 1 (2012).

Pages