Biblio
Export 21441 results:
The Operational Relevance of Culture and the Effectiveness of Cross-Cultural Competence. Empirical Findings from a Panel Study among German Soldiers of the 22nd ISAF contingent In multimedia presentation at the CIMIC Center of Excellence. Enschede, 2012.
"Operationalization of culture in population-centric operations – the American experience." In Balancing domestic and international security requirements, International Society of Military Sciences. Kingston: Royal Military College of Canada, 2012.
Opportunities to improve the draft laws on national security management, the intelligence, the military intelligence, and the national service for protection In CSDM Views. Sofia: Centre for Security and Defence Management, 2012.
Organizational and legal bases of critical infrastructure protection system construction against cyberattacks." In Information Security of the Person, Society and State., 2012.
"An Organizational Capability-Based Performance Measurement Model for Technology Conversion Process." JCC: The Business and Economics Research Journal 5, no. 2 (2012): 225-242.
"Organizational learning culture and innovativeness in Turkish firms." Journal of Management and Organization 18, no. 2 (2012): 193-219.
"Osama bin Corleone? Vito the Jackal? Framing Threat Convergence through an Examination of Transnational Organized Crime and International Terrorism." Terrorism and Political Violence 24, no. 2 (2012): 180-98.
"OSCE’s Cyber Security Confidence Building Measures Revealed by Anonymous. Digital Dao, 2012.
Overcoming the Challenge of Legacy Learning Methods." Connections: The Quarterly Journal 11, no. 4 (2012): 43-51.
"Overview of Fine Exact Methods of Safety Engineering." Information & Security: An International Journal 28, no. 2 (2012): 167-178.
"An Overview of the Department of Defense Architecture Framework (DoDAF)." Proceedings of the Sixth International Conference “Information Systems & Grid Technologies” (ISGT’2012), (2012).
"An overview of the use of neural networks for data mining tasks." WIREs Data Mining and Knowledge Discovery 2, no. 3 (2012): 193-208.
"An Overview of Wireless Sensor Networks Applications and Security." International Journal of Soft Computing and Engineering 2, no. 2 (2012): 538-540.
"Overview – United States Department of Defense Fiscal Year 2013 Budget Request. Washington, D.C.: U.S. Department of Defense, 2012.
Ownership Authentication by Digital Image Watermarking Based on Block Truncation Coding In Advanced Informatics School. Vol. Master of Computer Science (Information Security). Universiti Teknologi Malaysia, 2012.
Pacific Endeavor 2012 Begins. United States Pacific Command Web Site, 2012.
Panetta Warns of Dire Threat of Cyberattack on U.S." The New York Times (2012).
"The paranoid style in American politics. Vintage, 2012.
Party of Fraud: Hizballah's Criminal Enterprises. PolicyWatch 1911, 2012.
Pathways to Regional Resilience In The Governance of Adaptation., 2012.
A Patronizing Narrative Pigeonholes Arabs In NOW Lebanon ., 2012.
Pentagon Establishes Defense Clandestine Service, New Espionage Unit." Washington Post (2012).
" The Periphery of the Periphery: the Western Balkans and the Euro Crisis In European Council of Foreign Relations Brief., 2012.
The Phenomenon of Foreign Fighters in Europe. International Centre for Counter-Terrorism, 2012.