Biblio
Export 21430 results:
For the West, ‘Game Over’ in Central Asia." European Dialogue (2010).
"Foreign Fighters: Trends, Trajectories and Conflict Zones. Washington, DC: George Washington University Homeland Security Policy Institute, 2010.
Foreword." Connections: The Quarterly Journal 9, no. 3 (2010): 1-2.
"Foreword." In Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices. Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2010.
"Formal approach to security metrics. What does ‘more secure’ mean for you? In IEEE/ASME International Conference on Mechatronic and Embedded Systems and Applications., 2010.
Formal Methods." In Encyclopedia of Software Engineering, ed. Philip A. Laplante, 308-320. Taylor & Francis, 2010.
"Foundations of Information Security Based on ISO27001 and ISO27002. Van Haren Publishing, 2010.
Four Important Natural Hazards from Romania." Romanian Journal of Mineral Deposits 84 (2010): 113-115.
"A Framework for Health Care Information Assurance Policy and Compliance." Communications of the ACM 53, no. 3 (2010): 126-131.
"A framework for Internal Fraud Risk Reduction at IT Integrating Business Processes: The IFR² Framework." International Journal of Digital Accounting Research 9 (2010).
" "From Cottage Industry to International Organisation: The Evolution of Salafi-Ji-hadism and the Emergence of the Al Qaeda Ideology." Terrorism and Political Violence 22 (2010): 542.
"From States to Polities: Reconceptualizing Sovereignty through Inuit Governance." European Journal of International Relations 16, no. 3 (2010): 485-510.
"From Yokohama Strategy to Hyogo Framework: Sharing the Japanese Experience of Disaster Risk Management." Asian Journal of Environment and Disaster Management 2, no. 3 (2010): 249-262.
"A Fuzzy Commitment Scheme with McEliece’s Cipher." Survey in Mathematics and Its Application 5 (2010): 73-83.
"A Game Theory Application of the Rational Actor Model to the Russo-Georgian War of August 2008." Connections: The Quarterly Journal 10, no. 1 (2010): 82-120.
"GAO Report on Afghanistan Drug Control." Connections: The Quarterly Journal 9, no. 2 (2010): 89-118.
"GAO urges changes in budgeting for national security." Washington Post (2010).
"Gazprom’s official website., 2010.
GCHQ: The Uncensored History of Britain’s Most Secret Intelligence Agency. London: Harper Press, 2010.
Geir Hallingstad and Luc Dandurand, Cyber Defence Capability Framework - Revision 2. The Hague: NATO C3 Agency, 2010.
A gender perspective in peacekeeping missions: discussing guidelines. Clingendael Netherlands Institute of International Relations, 2010.
Gender, Women and Security Sector Reform." International Peacekeeping 17, no. 2 (2010): 281.
"General McChrystal Fired. Allvoices.com, 2010.
Generalized Net Model for Building a Standard Ad-hoc Ondemand Distance Vector Routing in a Wireless Network In Development in Fuzzy Sets, Intuitionistic Fuzzy Sets,” Generalized Nets and related topics. Vol. II. Warsaw: System Research Institute, Polish Academy of Science, 2010.