Biblio

Export 21377 results:
2010
Krautsevich, Leanid, Fabio Martinelli, and Artsiom Yautsiukhin. Formal approach to security metrics. What does ‘more secure’ mean for you? In IEEE/ASME International Conference on Mechatronic and Embedded Systems and Applications., 2010.
Hinchey, Michael G., Jonathan P. Bowen, and Emil Vassev. "Formal Methods." In Encyclopedia of Software Engineering, ed. Philip A. Laplante, 308-320. Taylor & Francis, 2010.
Hintzbergen, J., K. Hintzbergen, A. Smulders, and H. Baars. Foundations of Information Security Based on ISO27001 and ISO27002. Van Haren Publishing, 2010.
Marinescu, M., C. Stanciu, and G. Marinescu. "Four Important Natural Hazards from Romania." Romanian Journal of Mineral Deposits 84 (2010): 113-115.
Cannoy, Sherrie Drye, and A. F. Salam. "A Framework for Health Care Information Assurance Policy and Compliance." Communications of the ACM 53, no. 3 (2010): 126-131.
Jans, Mieke, Nadine Lybaert, and Koen Vanhoof. "A framework for Internal Fraud Risk Reduction at IT Integrating Business Processes: The IFR² Framework." International Journal of Digital Accounting Research 9 (2010).
Trujillo, Sarabeth K.. "The Franco-American Alliance: The Steel Tariffs, Why the Iraq War Is Not A Deal–Breaker, & Why the Alliance Still Matters." (2010).
Turner, John. "From Cottage Industry to International Organisation: The Evolution of Salafi-Ji-hadism and the Emergence of the Al Qaeda Ideology." Terrorism and Political Violence 22 (2010): 542.
Shadian, Jessica. "From States to Polities: Reconceptualizing Sovereignty through Inuit Governance." European Journal of International Relations 16, no. 3 (2010): 485-510.
Nishikawa, Satoru. "From Yokohama Strategy to Hyogo Framework: Sharing the Japanese Experience of Disaster Risk Management." Asian Journal of Environment and Disaster Management 2, no. 3 (2010): 249-262.
Ojha, Deo Brat, and Ajay Sharma. "A Fuzzy Commitment Scheme with McEliece’s Cipher." Survey in Mathematics and Its Application 5 (2010): 73-83.
Pochkhua, Gela. "A Game Theory Application of the Rational Actor Model to the Russo-Georgian War of August 2008." Connections: The Quarterly Journal 10, no. 1 (2010): 82-120.
GAO, U.S.. "GAO Report on Afghanistan Drug Control." Connections: The Quarterly Journal 9, no. 2 (2010): 89-118.
Pincus, Walter. "GAO urges changes in budgeting for national security." Washington Post (2010).
Gazprom’s official website., 2010.
Aldrich, Richard. GCHQ: The Uncensored History of Britain’s Most Secret Intelligence Agency. London: Harper Press, 2010.
Geir Hallingstad and Luc Dandurand, Cyber Defence Capability Framework - Revision 2. The Hague: NATO C3 Agency, 2010.
Smits, Rosan. A gender perspective in peacekeeping missions: discussing guidelines. Clingendael Netherlands Institute of International Relations, 2010.
Mobekk, Eirin. "Gender, Women and Security Sector Reform." International Peacekeeping 17, no. 2 (2010): 281.
Roberts, Veronica. General McChrystal Fired. Allvoices.com, 2010.
Vardeva, Ivelina, and Dimitar Valchev. Generalized Net Model for Building a Standard Ad-hoc Ondemand Distance Vector Routing in a Wireless Network In Development in Fuzzy Sets, Intuitionistic Fuzzy Sets,” Generalized Nets and related topics. Vol. II. Warsaw: System Research Institute, Polish Academy of Science, 2010.
Shannon, Anthony, Mariya Hristova, and Dae San Kim. "Generalized Net Model of a Student’s Course Evaluation with Intuitionistic Fuzzy Estimations in a Digital University." Proceedings of the Jangjeon Mathematical Society 13, no. 1 (2010): 31-38.
Alghamdi, Abdullah S., Syed Amanullah Quadri, Iftikhar Ahmad, and Khalid Al-Nafjan. "A Generic Approach to Security Assured Net-Centric Communications Network Architecture for C4I Systems." In Security Technology, Disaster Recovery and Business Continuity, 244-249. Berlin Heidelberg: Springer-Verlag, 2010.
Geneva Talks on Caucasus End in Deadlock. AbkhazWorld, 2010.
Mikhelidze, Nona. "The Geneva Talks over Georgia’s Territorial Conflicts: Achievements and Challenges." Istituto Affari Internazionali 10, no. 25 (2010): 3-5.

Pages