Biblio

Export 21362 results:
2014
Singer, P. W., and Allan Friedman. Cybersecurity and Cyberwar, What Everyone Needs to Know. Oxford University Press, 2014.
Geer, Dan. "Cybersecurity as Realpolitik." In Black Hat USA 2014 Conference., 2014.
Cybersecurity Capability Maturity Model (C2M2), Version 1.1., 2014.
Wandera, Max, Brent Jonasson, and Jacques Benoit. Cybersecurity Considerations for Electrical Distribution Systems In White Paper., 2014.
Cybersecurity in 2015: What to expect? In 2015 Global Megatrends in Cybersecurity. ZDNET, 2014.
Cybersecurity’s Maginot Line: A Real-World Assessment of the Defense-in-Depth Model In Complimentary Report . Milpitas: FireEye Inc., 2014.
Cybersecurity strategy of Ukraine In draft., 2014.
Cybersecurity's Maginot Line: A Real-world Assessment of the Defense-in-Depth Model In Complimentary Report. Milpitas: FireEye Inc., 2014.
Burt, David, Aaron Kleiner, Paul Nicholas, and Kevin Sullivan. Cyberspace 2025: Navigating the Future of Cybersecurity Policy. Microsoft Corporation, 2014.
Appel, Edward J.. Cybervetting: Internet Searches for Vetting, Investigations, and Open-Source Intelligence. Taylor & Francis Group, LLC, 2014.
Mehan, Julie. CyberWar, CyberTerror, CyberCrime and CyberActivism: An In-depth Guide to the Role of Standards in the Cybersecurity Environment. IT Governance Publishing, 2014.
Evangelista, Stefania, Giovanni De Marinis, Cristiana Di Cristo, and Angelo Leopardi. "Dam-break dry granular flows: experimental and numerical analysis." Wseas Transactions on Environment and Development 10 (2014).
Grande, Allison. Data Breaches Put Retail GCs in the Firing Line. New York: Law360, 2014.
Chen, Qi, Amanda Whitbrook, Uwe Aickelin, and Chris Roadknight. "Data classification using the Dempster–Shafer method." Journal of Experimental & Theoretical Artificial Intelligence 26, no. 4 (2014): 493-517.
David Delight Plus In Operator's Manual. Canada: Mind Alive Inc., 2014.
Vermaut, Vincent. De economische effecten van piraterij in Zuidoost-Azië. Vol. Master in de Maritieme Wetenschappen. Universiteit Antwerpen – Faculteit Toegepaste Economische Wetenschappen, Universiteit Gent – Faculteit Rechtsgeleerdheid, 2014.
Prucha, Nico. Death from Above: Jihadist Virtual Networks Respond to Drone Strikes in Yemen. Jihadica.com, 2014.
Larivé, Maxime H. A.. Debating European Security and Defense Policy: Understanding the Complexity. Farnham, Burlington: Ashgate Publishing Company, 2014.
Van Fenema, P, S Rietjens, and B. Besters. "De-Conflicting Civil-Military Networks." In Network Topology in Command and Control: Organization, Operation, and Evolution. IGI Global, 2014.
Muggah, Robert. "Deconstructing the Fragile City: Exploring Insecurity, Violence, and Resilience." Environment and Urbanization 26, no. 2 (2014): 345-58.
Petriashvili, Maka. Defense institution building: the dynamics of change in Georgia and the need for continuity of effort. Thesis : Monterey, California: Naval Postgraduate School, 2014.
Tzvetkov, Georgi. "Defense Policy and Reforms in Bulgaria since the End of the Cold War: A Critical Analysis." Connections: The Quarterly Journal 13, no. 2 (2014): 65-78.
Rodrigues, Renato. Defining a test automation system for mobile apps In Faculdade de Engenharia. Vol. Mestrado Integrado em Engenharia Informática e Computação. Universidade do Porto, 2014.
Gonnouni, Amina El, and Frederic Lehmann. "Deghosting method for multiple target tracking in a single frequency network." In 2014 International Radar Conference. Lille, France , 2014.
Aprasidze, David. "Democratization’s Vicious Circle or How Georgia Failed to Change." Connections: The Quarterly Journal 13, no. 4 (2014): 67-74.

Pages