Biblio

Export 21362 results:
2012
Schadlow, Nadia. "Competitive Engagement: Upgrading America’s Influence." Small Wars Journal (2012).
Prati, R., and G. Batista. "A complexity-invariant measure based on fractal dimension for time series classification." IJNCR 3, no. 3 (2012): 59-73.
Hemamali, Tennakoon. A Comprehensive Methodology for Profiling Cyber-criminals. Asia Pacific Institute of Information Technology, 2012.
McCarthy, N.K.. The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk . McGraw-Hill Osborne Media, 2012.
Rocha, L.. Computer Security Incident Handling – 6 Steps. Count Upon Security., 2012.
Chichonski, Paul, Tom Millar, Tim Grance, and Karen Scarfone. Computer Security Incident Handling Guide In Special Publication. National Institute of Standards and Technology (NIST), 2012.
López, David, Oscar Pastor, and Luis Javier García. "Comunicación de Eventos de Seguridad orientada al Análisis de Riesgos Dinámico." In XII Spanish Meeting on Cryptology and Information Security (RECSI), . San Sebastián, 2012.
Bechelloni, Giovanni. "Comunicazione Strategica e Strategie Communicative: le cose del Mondo tra Ignoranza e Avidita." In Studi di strategia: Guerra, politica, economia, semiotica, psicoanalisi, matematica. Egea, 2012.
López, David, Oscar Pastor, and Luis Javier García. "Concepto y Enfoques sobre el Análisis y la Gestión Dinámica del Riesgo en Sistemas de Información." In XII Spanish Meeting on Cryptology and Information Security (RECSI). San Sebastián, 2012.
Fernández, Diego, Oscar Pastor, Sarah Brown, Emily Reid, and Christopher Spirito. "Conceptual Framework for Cyber Defense Information Sharing within Trust Relationships." In Proceedings of the Fourth International Conference on Cyber Conflict (CYCON) , 429-445. Tallinn: NATO CCD COE Publications, 2012.
Conclusions of the Council on the South Caucasus In 3149th Foreign Affairs Council Meeting. Council of the European Union, 2012.
Caforio, Giuseppe. "The Concreteness of Asymmetric War: Fragments of Experience." Connections: The Quarterly Journal 11, no. 3 (2012): 21-39.
Day, David J., Denys A. Flores, and Harjinder Singh Lallie. CONDOR: A Hybrid IDS to Offer Improved Intrusion Detection In 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications. Liverpool, UK: TrustCom , 2012.
Sue, Valerie, and Lois Ritter. Conducting Online Surveys . Thousand Oaks, CA: Sage Publications, 2012.
Johnson, Jeh Charles. The Conflict Against Al Qaeda and its Affiliates: How Will It End? In paper presented at the Oxford Union. Oxford, UK: Oxford University, 2012.
Sanger, David. Confront and Conceal: Obama’s Secret Wars and Surprising Use of American Power. New York: Crown Publishers, 2012.
Ekpo, E.E.. "Confronting the Realities of Corruption in Nigeria." In Corruption and Nigeria’s Underdevelopment, 46-67. Lagos: Serenity Press, 2012.
Consolidated Report. Organization for Security and Cooperation in Europe, Forum for Security Co-operation, 2012.
De Bruyne, Tom. ‘A constable marine’: De strijd tegen piraterij als case voor het veranderend veiligheidsdenken, Master in de criminologische wetenschappen. Vol. Master in de criminologische wetenschappe. Universiteit Gent, 2012.
Glazev, S. Y.. Contemporary Theory of Wave Length in the Economic Eevelopment., 2012.
Gunes, Cengiz. "Contesting Democracy and Pluralism: the Pro-Kurdish Political Parties in Turkey." In The Kurdish National Movement in Turkey: From Protest to Resistance, 154. New York: Routledge, 2012.
Ratchev, Valeri, Uwe Nerlich, and Todor Tagarev. Context Scenarios and Alternative Future EU Roles as a Global Security Actor In It4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2012.
Alipiev, Ilian. The control function in the draft laws on national security management, the intelligence, the military intelligence, and the national service for protection In CSDM Views. Sofia: Centre for Security and defence Management, 2012.
Anderson, David. Control Orders in 2011: Final Report of The Independent Reviewer on The Prevention of Terrorism Act 2005. London: The Stationery Office, 2012.
Fazlagic, Samir, Narcis Behlilovic, and Sasa Mrdovic. "Controlled Delegation of Signature in Workflow Systems." In 20th Telecommunications Forum (TELFOR). Belgrade, Serbia , 2012.

Pages