Biblio

Export 21362 results:
2014
Baram, Amatzia. Saddam Husayn and Islam, 1968-2003. Ba’thi Iraq from Secularism to Faith. Washington DC: Woodrow Wilson Center Press, 2014.
Saudi Doctor Who Joined ISIS Killed: Reports. Al Arabiya News, 2014.
Zelin, Aaron. "The Saudi Foreign Fighter Presence in Syria." CTC Sentinel 7, no. 4 (2014): 10-14.
Boghardt, Lori Plotkin. Saudi Funding of ISIS. The Washington Institute, 2014.
Tagarev, Todor, and Lidia Velkova. "Scenarios for Resource Allocation to Bulgaria’s Defense in the Horizon of 2035." Journal of Defense Management 4, no. 1 (2014): 119.
Tagarev, Todor, and Lidia Velkova. "Scenarios for Resource Allocation to Bulgaria’s Defense in the Horizon of 2035." Journal of Defense Management 4, no. 1 (2014).
"Scots Jihadist Abdul Raqib Amin says he was recruited through the Internet and is prepared to die for his cause." Daily Record (2014).
Second Investigation Department under the Ministry of National Defence Assessment of Threats to National Security., 2014.
Liu, Yanjun. "A Secure and Efficient t-out-of-n Oblivious Transfer Based on the Generalized Aryabhata Remainder Theorem." Journal of Information Hiding and Multimedia Signal Processing 5, no. 2 (2014).
Alnatheer, Mohammed A.. "Secure Socket Layer (SSL) Impact on Web Server Performance." Journal of Advances in Computer Networks 2, no. 3 (2014): 211-217.
Muftić, Lisa. "Securing the Border in Bosnia and Herzegovina: An Exploratory Analysis of the Impact of Training on Officers' Knowledge and Experiences Related to Sex Trafficking." European Journal on Criminal Policy & Research 20, no. 2 (2014): 225-241.
Birdisli, Fikret. "Securitization of Kurdish Question in Turkey." International Journal of Research in Social Sciences 4, no. 2 (2014).
Burnashev, Rustam. "Securitization of Terrorism in Weak States: The Case of Central Asia." In International Conference on “Prospects of EU-Central Asia Relations”. Kazakhstan: Almaty, 2014.
Howorth, Jolyon. Security and Defence Policy in the European Union. Basimgstoke: Palgrave MacMillan, 2014.
Alharbi, Nawaf, Maria Papadaki, and Paul Dowland. "Security challenges of E-government adoption based on end users' perspective ." In The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014) ., 2014.
Vasileiadis, Alexios. "Security Concerns and Trust in the Adoption of M-Commerce." Social Technologies 4, no. 1 (2014): 179-191.
Balduzzi, Marco, Alessandro Pasta, and Kyle Wilhoit. A security evaluation of AIS automated identification system In ACSAC '14, 30th Annual Computer Security Applications Conference., 2014.
Alharbi, Nawaf, Maria Papadaki, and Paul Dowland. "Security Factors Influencing End Users’ Adoption of E-Government." Journal of Internet Technology and Secured Transactions (JITST) 3, no. 4 (2014).
Kharchenko, Vyacheslav, Oleg Illiashenko, Eugene Brezhnev, Artem Boyarchuk, and Vladimir Golovanevskiy. "Security Informed Safety Assessment of Industrial FPGA-Based Systems." In Probabilistic Safety Assessment and Management PSAM 12. Honolulu, Hawaii, 2014.
Kharchenko, Vyacheslav S., Oleg A. Illiashenko, and Andriy A. Kovalenko. Security informed safety assessment of NPP I&C systems: GAP-IMECA technique In 22nd International Conference on Nuclear Engineering ICONE22. Prague, Czech Republic, 2014.
Monev, Vesselin. Security of SSD Drives with Full Disk Encryption and Some Attacks (in Bulgarian) In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2014.
Jing, Qi, Athanasios V. Vasilakos, Jiafu Wan, Jingwei Lu, and Dechao Qiu. "Security of the Internet of Things: perspectives and challenges." Wireless Networks 20, no. 8 (2014): 2481-2501.
Whitehouse, Ollie. Security of Things: An Implementers’ Guide to Cyber-Security for Internet of Things Devices and Beyond. NCC Group, 2014.
Security Policy 2014. Ministry of Interior, 2014.
Serbia: Progress Report. European Commission, 2014.

Pages