Biblio

Export 21377 results:
2010
A Strong Britain in an Age of Uncertainty: The National Security Strategy. UK Cabinet Office, 2010.
Stigak, A.А.. "The structure of payment systems and modeling their performance based on system analysis." Electronic modeling 6 (2010): 97-109.
Di Mauro, Carmelo, Sara Bouchon, Christiaan Logtmeijer, Russell Pride, Thomas Hartung, and Jean-Pierre Nordvik. "A Structured Approach to Identifying European Critical Infrastructures." International Journal of Critical Infrastructures 6, no. 3 (2010).
Yang, Zhou. Study on the vulnerability of road transport network based on Flow Interdiction Model. Beijing: Beijing Normal University, 2010.
"The Stuxnet Outbreak, A Worm in the Centrifuge – An Unusually Sophisticated Cyber-weapon is Mysterious but Important." Economist (2010).
Tsyganok, Vitaliy, and Sergii V. Kadenko. "On sufficiency of the consistency level of group ordinal estimates." Journal of Automation and Information Sciences 42, no. 8 (2010): 42-47.
Salter, Mark B.. "Surveillance." In The Routledge Handbook of New Security Studies. London: Routledge, 2010.
Teixeira, Thiago, and Gershon Dublon. "A Survey of Human-Sensing: Methods for Detecting Presence, Count, Location, Track, and Identity." ACM Computing Surveys 5 54, no. 1 (2010): 59.
SySSec Project Web Page., 2010.
Spencer, Alexander. The tabloid terrorist: The predicative construction of new terrorism in the media. New York: Palgrave Macmillan, 2010.
Durbin, Pat, and Terry Doerscher. Taming Change with Portfolio Management: Unify Your Organization, Sharpen Your Strategy and Create Measurable Value . Austin, TX: Greenleaf Book Group Press, 2010.
Bazhanov, Yevgeny. "Tangled Triangle of Russia, China and the U.S." The Moscow Times (2010).
Ivanova, Petya. Technical Evaluation Report In Analytical Support to Defence Transformation. Paris: NATO RTA, 2010.
Serih, Andrey. Technical regulation in construction. Analytical review of world experience. Chicago: SNIP, 2010.
Stocker, Mike. Technology Insertion and Management: Options for the Canadian Forces In Technical memorandum., 2010.
Hryshchuk, Ruslan V.. Teoretychni osnovy modeljuvannja procesiv napadu na informaciju metodamy teorij dyferencialnyh igor ta dyferencialnyh peretvoren. Zhytomyr: Ruta, 2010.
Servenay, David. Terroisme: pourquoi Alliance Base a fermé ȧ Paris. Rue 89, L’Obs, 2010.
Yu, Lian, Wei-Tek Tsai, Liangjie Tang, Wei Zhao, Xiangji Chen, Linqing Liu, and Yan Zhao. Testing as a Service over Cloud In Fifth IEEE International Symposium on Service Oriented System Engineering (SOSE). Nanjing, China, 2010.
Ahmad, Abu Umar Faruq. Theory and Practice of Modern Islamic Finance: The Case Analysis from Australia. Universal-Publishers, 2010.
Jaspal, Zafar Nawaz. "Threat of Extremism &Terrorist Syndicate beyond FATA." Journal of Political Studies 1, no. 2 (2010): 19-49.
Minchev, Zlatogor. Threats and Challenges in Social Networks. A European Glance and Alliance Perspective in the Context of the New Strategic Concept In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2010.
Time for a Human Approach. Zurich: ISN, 2010.
TK_02_60 Project Web Page., 2010.
Park, Hyun-A, JaeHyun Park, JaeTark Choi, and DongHoon Lee. Toward an integrated system between cloud computing and smartcard application In 5th International Conference on Computer Sciences and Convergence Information Technology. Seoul, South Korea , 2010.
Rego, Francisco, Cristina Montiel, and Jorge Agudo. "Towards integrated fire management: The need for a European Framework Directive on Fire." In Conference on Protection of Forests, Spanish Presidency of the European Union. La Granja–Valsaín, 2010.

Pages