Biblio

Export 21398 results:
2016
Department of Defense Press Briefing by Gen. Breedlove in the Pentagon Briefing Room. U.S. Department of Defense, 2016.
Amin, Ruhul, SK Hafizul Islam, Arijit Karati, and G. P. Biswas. "Design of an enhanced authentication protocol and its verification using AVISPA." In 3rd International Conference on Recent Advances in Information Technology (RAIT). Dhanbad, India , 2016.
Mario, Hermann, Pentek Tobias, and Boris Otto. Design Principles for Industrie 4.0 Scenarios In 49th Hawaii International Conference on System Sciences (HICSS). Koloa, HI, USA, 2016.
Details of Treaty No.141 In Convention on Laundering, Search, Seizure and Confiscation of the Proceeds from Crime., 2016.
Aleksanova, I., P. Raykova, D. Solakov, and S. Simeonova. "Deterministic earthquake scenarios based on macro seismic information." In VIII National Conference on Geophysics., 2016.
Nieman, Craig M.. Deterrence and Engagement: A Blended Strategic Approach to a Resurgent Russia In Technical Report. Norfolk United States: National Defense Univ Norfolk VA, 2016.
I Yoga, Gusti Agung Ketu. "Developing a Model of Learning Management of The Semester Credit System in Magelang Military Academy." The Journal of Educational Development 4, no. 1 (2016): 91-98.
Armando, Alessandro, Gabriele Costa, Alessio Merlo, Luca Verderame, and Konrad Wrona. Developing a NATO BYOD Security Policy In International Conference on Military Communications and Information System, ICMCIS. Brussels, Belgium, 2016.
Zhukovyts’kyy, Igor, and Denis Ostapec. "Development of Tools for Practical Research on Cybersecurity in Msc Theses." Information & Security: An International Journal 35, no. 1 (2016): 81-97.
Die Sicherheitspolitik der Schweiz: Bericht des Bundesrates., 2016.
Directive (EU) 2016/1148 of the European Parliament and of the Council ., 2016.
Hoossein, Shafick, Roman Tandlich, Kevin Whittington-Jones, Richard K. Laubscher, Phindile Madikizela, and Bongumusa M. Zuma. "Disaster management policy options to address the sanitation challenges in South Africa." Journal of Environmental Health 78, no. 7 (2016): E1-E7.
Distance Learning System “Prometheus” In LLC “Virtual Technologies in Education” - in Russian., 2016.
Chen, Yanming, Qingjie Zhao, Zhulin An, Peng Lv, and Liujun Zhao. "Distributed Multi-Target Tracking Based on the K-MTSCF Algorithm in Camera Networks." IEEE Sensors Journal 16, no. 13 (2016).
Kharchenko, Vyacheslav, and Oleg Illiashenko. Diversity for security: case assessment for FPGA-based safety-critical systems In 20th International Conference on Circuits, Systems, Communications and Computers (CSCC 2016) . Vol. 76., 2016.
Rudović, Miloš. DNP sarađuje sa Putinovom partijom: Deklaracija potpisana uz blagoslov Amfilohija [DNP Cooperates with Putin’s Party: Declaration Signed with the Blessing of Amfilohije]. Portal Vijesti, 2016.
Doctrine of National Security of the Russian Federation - 2016 In Presidential order № 646., 2016.
DoD Directive 5205.82 Defense Institution Building (DIB). Office of the Under Secretary of Defense for Policy, 2016.
Revkin, Mara, and Jacob Olidort. "Does ISIS Need Territory to Survive?" New York Times Room for Debate (2016).
Jansen, Marenne Mei, and Eric Hans Kramer. The Double Bind; an analysis of the comprehensive approach on an operational, institutional and conceptual level., 2016.
Faundez, Julio. "Douglass North’s Theory of Institutions: Lessons for Law and Development." Hague Journal on the Rule of Law 8, no. 2 (2016): 373-419.
Stephen, E. N.. "Drug Trafficking and the Threat to Nigeria’s National Security." Canadian Social Science 12, no. 12 (2016): 1-11.
Clarke, Colin. "Drugs & Thugs: Funding Terrorism through Narcotics Trafficking." Journal of Strategic Security 9, no. 3 (2016): 1-15.
Garamone, Jim. Dunford: Global Security Environment Has Implications for Joint Force. DoD News, 2016.
Gerth, Anthony, and Joe Peppard. "The dynamics of CIO derailment: How CIOs come undone and how to avoid." Business Horizons 59, no. 1 (2016): 61-70.

Pages