Biblio

Export 21401 results:
2011
Nussbaum, Martha. Creating Capabilities: The Human Development Approach. Harvard: Harvard University Press, 2011.
Aral, Sinan, and Dylan Walker. "Creating Social Contagion Through Viral Product Design: A Randomized Trial of Peer Influence in Networks." Management Science 57, no. 9 (2011): 1623-1639.
Clarke, Ryan. Crime-Terror Nexus in South Asia: States, Security and Non-State Actors. New York: Routledge, 2011.
Criminal Intelligence Manual for Analysts In United Nations Publications. UNODC, 2011.
Shah, Anup. "Crisis in Libya." Global Issues (2011): 2.
"Crisis in Libya: European Commission Allocates €3 Million to Address Humanitarian Needs." European Union Press Release (2011).
Van Wart, M., and N. Kapucu. "Crisis Management Competencies: The Case of Emergency Managers in the USA. ." Public Management Review 13, no. 4 (2011): 489-511.
Friedman, G.. "The Crisis of Europe and European Nationalism." Stratfor Global Intelligence Weekly (2011).
Minchev, Zlatogor, Kiril Boianov, and Hristo Turlakov. Critical Infrastructure Attacks In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2011.
ENISA. Critical Infrastructures and Services: Maritime., 2011.
Johannessen, Ola M., and Martin W. Miles. "Critical Vulnerabilities of Marine and Sea Icebased Ecosystems in the High Arctic." Regional Environmental Change (2011).
Khan, Muhammad Khurram, Soo-Kyun Kim, and Khaled Alghathbar. "Cryptanalysis and Security Enhancement of a “More Efficient & Secure Dynamic ID-Based Remote User Authentication Scheme”." Computer Communications 34, no. 3 (2011).
Georgiev, Venelin. Current issues in the acquisition of multirole fighters for the Bulgarian air force In CSDM Views. Sofia: Centre for Security and Defence Management, 2011.
Georgiev, Venelin. Current issues in the acquisition of multirole fighters for the Bulgarian air force In CSDM Views. Sofia: Centre for Security and Defence Management, 2011.
Gorman, Siobhan, and Julian E. Barnes. "Cyber Combat: Act of War ." The Wall Street Journal (2011).
Halder, Debarati, and K. Jaishankar. Cyber Crime and the Victimization of Women: Laws, Rights and Regulations. Information Science Reference, 2011.
Láng, Judit. "Cyber Defence after Lisbon and the Implications of NATO’s New Strategic Concept." Information & Security: An International Journal 26, no. 1 (2011): 7-11.
Schmitt, Michael N.. "Cyber Operations and the Jus Ad Bellum Revisited." Villanova Law Review 56, no. 3 (2011): 569-605.
Schmitt, Michael N.. "Cyber operations and the Jus Ad Bellum revisited." Villanova Law Review 3 (2011): 569-605.
Phahlamohlaka, Jackie, Joey Jansen Van Vuuren, and A. C. Coetzee. Cyber Security Awareness Toolkit for National Security: An Approach to South Africa’s Cyber Security Policy Implementation., 2011.
Cyber Security in the UK In Postnote. Houses of Parliament Parliamentary Office of Science and Technology, 2011.
Ashenden, Debi. "Cyber Security: Time for Engagement and Debate." In European Conference on Information Warfare and Security., 2011.
Androulidakis, Iosif. Cybercrime in Fixed Telephony Systems In Seminar 62/2011, High Tech & Cyber Crime. Brdo near Kranj, Slovenia: European Police College (CEPOL), 2011.
Cybercrime situation report In Joint Project on Regional Cooperation against Cybercrime. CyberCrime@IPA - EU/COE, 2011.
Minchev, Zlatogor. Cybersecurity and cyberdefence – elements of smart defence in 21st Century In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2011.

Pages