Biblio

Export 21362 results:
2014
Chen, Zhide, Cheng Qiao, Yihui Qiu, Li Xu, and Wei Wu. "Dynamics stability in wireless sensor networks active defense model." Journal of Computer and System Sciences 80, no. 8 (2014): 1534-1548.
Kosicki, Piotr, and Oksana Nesterenko. "Eastern Ukraine Has Been a Mafia State for Years. Can Kiev Break the Cycle of Violence?" New Republic (2014).
Tagarev, Todor, and Lidia Velkova. "Economic Aspects of the Development of a Vision for Bulgaria’s Defense till 2035." In Conference on the Reforms in Bulgaria’s Security Sector. Sofia: New Bulgarian University, 2014.
Zeneli, Valbona. "Economic Development in the Western Balkans: On the Road to Competitive Market Economies?" Connections: The Quarterly Journal 13, no. 4 (2014): 53-66.
Zeneli, Valbona. "Economic Security in Southeast Europe." Per Concordiam: Journal of European Security and Defense Issues 4, no. 4 (2014): 10-16.
Schouten, Peer. "ecurity as Controversy: Reassembling Security at Amsterdam Airport." Security Dialogue 45, no. 1 (2014): 23-42.
Lowenthal, Mark M.. "The Education and Training of Intelligence Analysts." In Analyz-ing Intelligence: National Security Practitioners’ Perspectives . Roger Z. George and James B. Bruce ed. Washington: DC: Georgetown University Press, 2014.
van den Homberg, Marc, Reinout Pieneman, and Judith van de Kuijt. Effectiveness of a Multi-Stage Networked Organisation for Early Integration of Multiple Perspectives on Emerging and Future Crises., 2014.
Prezelj, Iztok, and Daniel Harangozo. Effectiveness of the Vienna Document CSBM Regime: Assessment of Experts’ Perceptions. Ljubljana: University of Ljubljana, Faculty of Social Sciences, Defence Research Centre, 2014.
Baker, David Mc. A.. "The Effects of Terrorism on the Travel and Tourism Industry." International Journal of Religious Tourism and Pilgrimage 2, no. 1 (2014): 64-5.
Bremananth, R., and Ahmad Sharieh. "An efficient Approach of e-Iris Enrolling and Authentication for FS e-Apps." e-AGE 2014, Arab States Research and Education Network (2014).
Al-Aghbari, Anas, Othman Ibrahim, and Faisal Saeed. "E-Government Readiness Ranking and Challenges in Yemen." In 1st International Conference of Recent Trends in Information and Communication Technologies., 2014.
Egyptian ex-Defense Minister As-Sisi wins 96.91 % of presidential election votes. Vol. 3 June 2014. ITAR-TASS, 2014.
Lis, Andrzej. " E-learning w organizacjach wojskowych: doświadczenia sojusznicze i wnioski dla sił zbrojnych (E-learning in Military Organisations: Lessons from the Allies and Recommendations for the Polish Armed Forces)." Studia Ekonomiczne 199 (2014): 134-145 .
Siponen, Mikko, Adam Mahmood, and Seppo Pahnila. "Employees’ Adherence to Information Security Policies: An Exploratory Field Study." Information and Management 51, no. 2 (2014): 217-24.
Armando, Alessandro, Gabriele Costa, Alessio Merlo, and Luca Verderame. Enabling BYOD Through Secure Meta-market In 2014 ACM Conference on Security and Privacy in Wireless & Mobile Networks, WiSec’14. Oxford, United Kingdom, 2014.
Enclaves in Central Asia: The Post-imperial Chessboard. The Economist, 2014.
Tucker, Spencer C.. The Encyclopedia of the Wars of the Early American Republic, 1783–1812: A Political, Social, and Military History. ABC-CLIO, 2014.
Ganz, Aurora. Energy Security Issues: Is NATO Becoming a (Pivotal) Actor?. SciencesPo, Centre de Recherches Internationales, 2014.
Söhret, Mesut. "Enerjđ Güvenlđğđ Kapsaminda Nato’nun Ortadoğu Polđtđkasi." In International Energy and Security Congress that took place at Kocaeli University. Turkey: Kocaeli University, 2014.
Söhret, Mesut. "Enerjđ Güvenlđğđ Kapsaminda Nato’nun Ortadoğu Polđtđkasi." In International Energy and Security Congress. Turkey: Kocaeli University, 2014.
Engaging Men: The Journey Towards Gender Transformation. Plan, 2014.
England Coast Path: Improving Public Access to the Coast. Government of UK, 2014.
Pitrėnaitė-Žilėnienė, Birutė, Andrea Carosi, and Paolo Vallesi. "Enhancing Societal Resilience against Disasters: Engaging the Public via Social Technologies." Social Technologies 4, no. 2 (2014): 318-332.
ENISA. ENISA Threat Landscape 2014: Overview of current and emerging cyber-threats., 2014.

Pages