Biblio

Export 21377 results:
2012
Mejias, Roberto. An Integrative Model of Information Security Awareness for Assessing Information Systems Security Risk In Annual Hawaii International Conference on System Sciences., 2012.
Warner, Michael. "Intelligence and Reflexivity: An Invitation to a Dialogue." Intelligence and National Security 27, no. 2 (2012): 167-171.
Wippl, Joseph W.. "Intelligence Exchange Through InterIntel." International Journal of Intelligence and CounterIntelligence 25, no. 1 (2012): 1-18.
Gill, Peter, and Mark Phythian. Intelligence in an Insecure World. Cambridge: Polity, 2012.
Glassman, Michael, and Min Ju Kang. "Intelligence in the internet age: the emergence and evolution of OSINT." Computers in Human Behavior 28, no. 2 (2012): 673-682.
Gill, Peter. "Intelligence, Threat, Risk and the Challenge of Oversight." Intelligence and National Security 27, no. 2 (2012): 206-222.
Intel® Virtualization Technology for Directed I/O (VT-d): Enhancing Intel platforms for efficient virtualization of I/O devices. Software Intel.com, 2012.
Tasevski, Predrag. Interactive Cyber Security Awareness Program. Germany: Lambert Academic Publishing (LAP), 2012.
Zhou, Yan, and Jianxun Li. "Interactive multiple Kalman filters based 3-D target tracking for two airborne platforms with bearings-only measurements." In 2012 24th Chinese Control and Decision Conference, CCDC 2012. Taiyuan; China, 2012.
Reydams, Luc, Jan Wouters, and Cedric Ryngaert. International Prosecutors. Oxford: Oxford University Press, 2012.
International Standards on Combatting Money Laundering and the Financing of Terrorism & Proliferation: The FATF Recommendations. Paris: FATF, 2012.
Calandro, Enrico, Cristoph Stork, and Alison Gillwald. Internet Going Mobile: Internet Access and Usage in 11 African Countries In Research ICT Africa., 2012.
Souter, David, and Monica Kerrets-Makau. Internet Governance in Kenya: An Assessment. ICT Development Associates Ltd, 2012.
Hersent, Olivier, David Boswarthick, and Omar Elloumi. The Internet of Things - Key Applications and Protocols. Chichester, West Sussex,United Kingdom: John Wiley and Sons, 2012.
Internet Security Threat Report In 2011 trends, vol. 17. Symantec, 2012.
Interview of Russian Foreign Minister S.V. Lavrov on “Sky News Arabia” television channel, 1547-18-08-2012. Vol. 18 August 2012. Official website of the Russian Ministry of Foreign Affairs, 2012.
Interview of Russian Foreign Minister S.V. Lavrov on Sky News Arabia television channel, 1547-18-08-2012. Vol. 18 August 2012. Official website of the Russian Ministry of Foreign Affairs, 2012.
Shaikh, Nermeen. Interview with Lila Abu-Lughod, Asia Source: “Why we can’t save Afghan women., 2012.
Abouzeid, Rania. "Interview with Official of Jabhat al-Nusra, Syria’s Islamist Militia Group." Time Magazine (2012).
Interview with Russian television channels. Vol. 26 April 2012. Official website of the President of Russia, 2012.
"Interview with Sergey Lavrov." Rossisyskaya gazeta (2012).
Born, Hans, and Gabriel Geisler Mesevage. "Introducing Intelligence Oversight." In Overseeing Intelligence Services: A Toolkit. DCAF, 2012.
Kronsell, Annica, and Erika Svedberg. "Introduction." In Making Gender, Making War: Violence, Military and Peacekeeping Practices, 2. Kindle edition. New York/London: Routledge, 2012.
Tehranipoor, Mohammad, and Cliff Wang. Introduction to Hardware Security and Trust. New York, NY: Springer, 2012.
Gorbenko, Anatoliy, Vyacheslav Kharchenko, Olga Tarasyuk, and Alexander Romanovsky. "Intrusion-Avoidance via System Diversity." Information & Security: An International Journal 28, no. 1 (2012): 154-158.

Pages