Biblio

Export 21362 results:
2014
How a Georgian sergeant became a Jihad leader in Iraq. Vol. 8 July 2014. BBC (Russian Service), 2014.
Karadsheh, Jomana, Jim Sciutto, and Laura Smith-Spark. How Foreign Fighters Are Swelling ISIS Ranks in Startling Numbers. CNN, 2014.
Ajbaili, Mustapha. How ISIS Conquered Social Media. Al Arabiya News, 2014.
J.M., Berger. How ISIS Games Twitter., 2014.
Pomerantsev, Peter. "How Russia Is Revolutionizing Information Warfare." Defense One (2014).
Read, Oliver. "How the 2010 Attack on Google Changed the US Government’s Threat Perception of Economic Cyber Espionage." In Cyberspace and International Relations, 203-230 . Berlin, Heidelberg : Springer, 2014.
Dokos, Thanos. "How the EU got it so Wrong in Ukraine." Europe’s World (2014).
Galeotti, Mark. "How the Invasion of Ukraine Is Shaking Up the Global Crime Scene." Vice News (2014).
Nuriyev, Elkhan. "How the West Helps Putin Fulfill His CIS Strategy." The Moscow Times (2014).
Bhalla, Gaurav. "How to plan and manage a project to co-create value with stakeholders." Strategy & Leadership 42, no. 2 (2014): 19-25.
Heiges, Mike, Rob Bever, and Kyle Carnahan. How to Safely Flight Test a UAV Subject to Cyber-Attacks In Cyber Defence Situation Awareness Symposium (STO-MP-IST-999), ., 2014.
HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack. HP News, 2014.
Human Development Index – Countries. United Nations, 2014.
Hai-Jew, S.. "Human rights, the global war on transnational terror, and the mixed roles of ICT: A meta-analysis." In Cyber Behavior: Concepts, Methodologies, Tools, and Applications , 1260-1294 ., 2014.
Solana, Javier. A Human Security Doctrine for Europe: The Barcelona Report of the Study Group on Europe’s Security Capabilities In Presented to EU Representative for Common and Security Policy. Study Group on Europe’s Security Capabilities, 2014.
The Huthis: From Saada to Sanaa. International Crisis Group, 2014.
Malekpour, Milad, Maryam Khademi, and Behrouz Minae-Bidgoli. "A Hybrid Data Mining Method for Intrusion and Fraud Detection in E-Banking Systems." Journal of Computational Intelligence and Electronic Systems 3, no. 1–6 (2014).
Hristov, Neno. "The Hybrid Threats: The New Challenge to the Security Sector (in Bulgarian)." Military Journal 121, no. 4 (2014): 111-117.
Horbulin, Volodymyr. "’Hybrid War’ as a key tool for Russian geostrategy of revenge." Strategic Priorities 4 (2014): 5.
"Hybrid Warfare: Briefing to the Subcommittee on Terrorism, Unconventional Threats and Capabilities." Committee on Armed Services, House of Representatives, 2014.
Lyutskanov, Emil. "The Hybrid 'Wars': Reflection and an Integral Component of the Global Security Environment (in Bulgarian)." Military Journal 121, no. 4 (2014): 102-110.
Bhatt, Devika. "I’ll Do Jail, Says Nun, 84, Who Broke into Nuclear Warhead Site." The Times (2014): 34.
Ideas of Erasian Integration of South Ossetia and Reunification with North Ossetia Discussed in Vladikavkaz (Idei evraziiskoi integratsii Yuzhnoi Ossetii i vossoedineniya s Severnoi Ossetiei obsuzhdayut vo Vladikavkaze). IA Regnum, 2014.
Karim, Iskander. Identifying Instability Pockets. Fort Leavenworth, Kansas: School of Advanced Military Studies, United States Army Command and General Staff College, 2014.
Calderoni, Francesco. "Identifying Mafia Bosses from Meeting Attendance." In Networks and Network Analysis for Defence and Security, 27-48. Cham: Springer International Publishing Switzerland, 2014.

Pages