Biblio

Export 21401 results:
2011
Abbass, H., A. Bender, S. Gaidow, and P. Whitbread. "Computational Red Teaming: Past, Present and Future." Computational Intelligence Magazine 6, no. 1 (2011).
Nikolova, Irena. Computer Assisted Exercise Management Environment for Civil Security. Vol. PhD Thesis. Sofia: Institute of ICT, 2011.
Nikolova, Irena. COMPUTER ASSISTED EXERCISES MANAGEMENT ENVIRONMENT FOR CIVIL SECURITY In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2011.
Nikolova, Irena. "Computer Assisted Exercises Management Environment for Civil Security." Information & Security: An International Journal 27, no. 2 (2011): 147-159.
Solomon, Michael G., K. Rudolph, Ed Tittel, Neil Broom, and Diane Barrett. Computer Forensics Jumpstart . Indianapolis, IN: Wiley Publishing Inc., 2011.
Brauch, Hans Günter. "Concepts of Security Threats, Challenges, Vulnerabilities and Risk." In Coping with Global Environmental Change, Disasters and Security. Berlin and Heidelberg: Springer, Hexagon Series on Human and Environmental Security and Peace, 2011.
Boden, Dieter. "Conflict Settlement for Abkhazia and South Ossetia: Lessons and Prospects." In South Caucasus – 20 Years of Independence, 131. Berlin: Friedrich-Ebert-Stiftung, 2011.
Government, HM. Contest: The United Kingdom’s Strategy for Countering Terrorism., 2011.
A conversation with Vladimir Putin. Continued. Vol. 15 December 2011. television channels Russia 1, Russia 24 and RTR-Planeta and on radio stations Mayak, Vesti FM and Radio Rossiya, 2011.
Adams, Terri, Leigh Anderson, Milanika Turner, and Jonathan Armstrong. "Coping through a Disaster: Lessons from Hurricane Katrina." Journal of Homeland Security and Emergency Management 8, no. 1 (2011).
Goel, Ajay, O.P.Sahu, Aman Soni, and Punit Soni. "A Copy Attack on Robust Digital Watermarking in Multi Domain for the Stego Images." Information & Security: An International Journal 26, no. 1 (2011): 27-33.
Kazi, Reshmi. "The Correlation Between Non-State Actors and Weapons of Mass Destruction." Connections: The Quarterly Journal 10, no. 4 (2011): 1-10.
Corruption in Serbia: Bribery as experienced by the population. UNDOC, Statistical Office of the Republic of Serbia, 2011.
UK Cabinet Office & Detica. The Cost of Cyber Crime., 2011.
Council conclusions on Further Developing Risk Assessment for Disaster Management within the European Union., 2011.
Tagarev, Todor. "Countering Corruption in the Defence Sector: Main Risks and Challenges." In International Conference “Strengthening Integrity and Combating Corruption in Ukraine’s Defence Sector". Kyiv, Ukraine, 2011.
Tagarev, Todor. Countering Corruption in the Defence Sector: Main Risks and Challenges In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2011.
Tagarev, Todor. Countering Corruption in the Defense Sector: Key Challenges to Bulgaria and Southeast Europe and Good Practice In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2011.
Murphy, Martin N., and Joseph Saba. "Countering Piracy: The Potential of Onshore Development." In Global Challenge, Regional Responses: Forging a Common Approach to Maritime Piracy, 46-51. Dubai, UAE: Dubai School of Government, 2011.
Aaronson, Michael, Sverre Diessen, Yves de Kermabon, Mary Beth Long, and Michael Miklaucicnato. "Countering the Hybrid Threat." PRISM 2, no. 4 (2011): 111-124.
Kristina, Wong. "Counterinsurgency in Afghanistan: Is it Working?" ABC News (2011).
Wood, David. "Counterinsurgency Strategy not Working in Afghanistan, Critics Say." Politics Daily (2011).
Wiil, Uffe Kock. Counterterrorism and Open Source Intelligence. Wien: Springer-Verlag, 2011.
Benavides, Abraham David, Saleh M. Alhumaid, and Emmanuel D. Quainoo. "Counterterrorism and Perspectives on Cultural Competency and Representation." In Counter Terrorism in Diverse Communities, 197-216. Vol. 90. IOS Press Ebooks, 2011.
Creating a Trusted Information Network for Homeland Security. Markle Foundation Task Force, 2011.

Pages