Biblio

Export 21362 results:
2014
"Countering Hybrid Threats: Challenges for the West." Strategic Comments 2014, no. 40 (2014): 21.
Peters, Allison. Countering Terrorism and Violent Extremism in Pakistan: Why Policewomen Must Have a Role In Policybrief . Institute for Inclusive Security, 2014.
Patil, Sameer. Counter-Terrorism and Federalism. Gateway House (Indian Council on Global Relations), 2014.
Holehouse, Matthew. "Counter-Terrorism Bill: What It Contains." Telegraph (2014).
Li, Xingan, and Martti Juhola. "Country crime analysis using the self-organizing map, with special regard to demographic factors." AI & SOCIETY 29, no. 1 (2014): 53-68.
Takacs, Viktoria, and Piotr Matczak. Country study: Hungary In Analysis of Civil Security Systems in Europe., 2014.
Matczak, Piotr, and Grzegorz Abgarowicz. Country study: Poland In Analysis of Civil Security Systems in Europe. Accessed., 2014.
Pulkki, Arto. "Crimea Invaded by High Readiness Forces of the Russian Federation." Suomen Sotilas (2014).
Carlile, L., and S. MacDonald. "The criminalisation of terrorists' online preparatory acts." In Cyberterrorism: Understanding, Assessment, and Response, 155-173., 2014.
Crisis Communication Action Plan - 2011 to 2013., 2014.
Gurunath, R., K.R. Anil Kumar, and S.K. Srivatsa. "Critical evaluation of vital role of human beings and computer systems in decision making process." International Journal of Engineering Science and Innovative Technology (IJESIT) 3, no. 1 (2014).
Martin, Ioana. Critical Information Infrastructure Protection: Towards Global Cyber Security In Regional Department of Defense Resources Management Studies. Romanian National Defense University, 2014.
Kominsky, Mitchell. "The Current Landscape of Cybersecurity Policy: Legislative Issues in the 113th Congress." Harvard Law School National Security Journal (2014).
Cyber Glossary In National Initiative for Cybersecurity Careers and Studies., 2014.
Cyber Security Challenge UK., 2014.
Boyanov, L., and Zlatogor Minchev. "Cyber Security Challenges in Smart Homes, Cyber Security and Resiliency Policy Framework." Cyber Security and Resiliency Policy Framework 38 (2014).
Keegan, Christopher. "Cyber Security in the Supply Chain: A Perspective from the Insurance Industry." Technovation 7, no. 34 (2014): 380-381.
Cyber Security Incident Response: Are We as Prepared as We Think?. Ponemon Institute, 2014.
Franke, Ulrik, and Joel Brynielsson. "Cyber Situational Awareness: A Systematic Review of the Literature." Computers & Security 46 (2014): 18-31.
Franke, Ulrik, and Joel Brynielsson. "Cyber situational awareness - A systematic review of the literature." Computers & Security 46 (2014): 18-31.
Minchev, Zlatogor. Cyber Threats Analysis In On-Line Social Networks With A Study On User Response In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2014.
Wilson, Clay. "Cyber Threats to Critical Information Infrastructure." In Cyberterrorism, 123-136. New York, NY, USA: Springer, 2014.
Cybersäkerhetscentrets Verksamhetsplan 2014–2016. Kommunikationsverket, 2014.
DoDI), Department of Defense. Cybersecurity., 2014.
Singer, P. W., and Allan Friedman. Cybersecurity and Cyberwar, What Everyone Needs to Know. Oxford University Press, 2014.

Pages