Biblio

Export 21401 results:
2010
Distler, Werner. "Die Bedingungen der Intervention: Interaktion in einer Ausnahmesituation." In Interventionskultur: Zur Soziologie von Interventionsgesellschaften, 119-40. Wiesbaden: VS Verlag, 2010.
Dion, Maeve. "Different Legal Constructs for State Responsibility." In International Cyber Security Legal & Policy Proceedings 2010, 69. Tallinn, Estonia: Cooperative Cyber Defence Center of Excellence, 2010.
Rogers, Everett M.. Diffusion of Innovations . New York: Simon and Schuster, 2010.
A Digital Agenda for Europe. Brussels: EC, 2010.
Lillard, Terrence V., Clint P. Garrison, Craig A. Schiller, and James Steele. Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data. Syngress Publishing, 2010.
Garfinkel, Simson L.. "Digital Forensics Research: The Next 10 Years." Digital Investigation 7 (2010): S64-S73.
Kovács, László, and Csaba Krasznay. "Digital Mohács: A Cyberattack Scenario against Hungary." Nation and Security 44 (2010): 44-56.
Cutter, Susan L., Christopher G. Burton, and Christopher T. Emrich. "Disaster Resilience Indicators for Benchmarking Baseline Conditions." Journal of Homeland Security and Emergency Management 7, no. 1 (2010).
Haensch, Stephanie. "Distinct Clones of Yersinia pestis Caused the Black Death." PLoS Pathogens 6 10 (2010).
Klump, Ray, and Matthew Kwiatkowski. "Distributed IP Watchlist Generation for Intrusion Detection in the Electrical Smart Grid." In Critical Infrastructure Protection, 13-126. IV ed. Berlin: Springer, 2010.
Dmitry Medvedev answers Russian journalists’ questions. Vol. 16 April 2010. Official website of the President of Russia, 2010.
Kubert, Joe. Dong Xoai, Vietnam 1965. New York DC: Comics Library, 2010.
Draft Report on an EU Strategy for the South Caucasus. European Parliament Committee on Foreign Affairs, 2010.
Tagarev, Todor. Driving forces of security services’ reform in the countries of Eastern Europe In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2010.
Babor, Thomas F., Jonathan P. Caulkins, Griffith Edwards, Benedikt Fischer, David R. Foxcroft, Keith Humphreys, Isidore S. Obot, Jürgen Rehm, and Peter Reuter. Drug Policy and the Public Good. Oxford: Oxford University Press, 2010.
Makochekanwa, Albert, and Marko Kwaramba. Dwindling access to basic services in Zimbabwe., 2010.
Vatsa, Mayank, Richa Singh, Afzel Noore, and Arun Ross. "On the Dynamic Selection of Biometric Fusion Algorithms." IEEE Transactions on Information Forensics and Security 5, no. 3 (2010).
Saradzhyan, Simon. "The Dynamics of Russia’s Response to the Piracy Threat." Connections: The Quarterly Journal 9, no. 3 (2010): 21-46.
Dempsey, Judy. "Eastern Europe Unites over Energy." International Herald Tribune (2010): 15.
Dimitrov, Dimitar. Economic Analysis “Cost/Benefit” in Defense and Security. Sofia: Stopanstvo, 2010.
Bahney, Benjamin, Howard J. Shatz, Carroll Ganier, Renny McPherson, and Barbara Sude. An Economic Analysis of the Financial Records of al-Qa‘ida in Iraq. Santa Monica, CA: RAND, 2010.
Melese, F.. Economic Evaluation of Alternatives., 2010.
Donnet, LTC. EEAW: Embryonic Component of Future European Air Combat?., 2010.
Tagarev, Todor. Effective Resource Management in a Good Governance Context In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2010.
Gaddam, Sunil V. K., and Manohar Lal. "Efficient Cancellable Biometric Key Generation Scheme for Cryptography." International Journal of Network Security 11, no. 2 (2010): 61-69.

Pages