Biblio

Export 21362 results:
2012
The Human Brain Project: A Report to the European Commission . Lausanne: The HBP-PS Consortium, 2012.
Hungarian National Security Strategy., 2012.
Mansoor, Peter R., Williamson Murray, and Peter R. Mansoor. "Hybrid War in History." In Hybrid Warfare: Fighting Complex Opponents from the Ancient World to the Present. Cambridge: Cambridge University Press, 2012.
Murray, Williamson, and Peter R. Mansoor. Hybrid Warfare: Fighting Complex Opponents from the Ancient World to the Present. Cambridge: Cambridge University Press, 2012.
van Wyk, Milandré Heidi. IBM Incorporated: An exploration of an Egyptian work ethic as constructed by South African expatriates working in Cairo. Vol. , Master of Arts (Sociology). University of Stellenbosch, 2012.
Fitriawan, Helmy, Ouriz Pucu, and Yohanes Baptista. "Identifikasi Plat Nomor Kendaraan Secara Off-Line Berbasis Pengolahan Citra dan Jaringan Syaraf Tiruan." Electrician – Jurnal Rekayasa dan Teknologi Elektro, no. 2 (2012).
Tverdokhlebov, Vladimir. "Identifying the Reasons for Failures in Large-Scale Systems." Information & Security: An International Journal 28, no. 2 (2012): 236-247.
Identity, Motives of Intruders onto Georgian Territory Remain Unclear. Radio Free Europe/Radio Liberty, 2012.
Ilves in Washington: All NATO Allies Must Contribute to Cyber Security. ERR News, 2012.
Khatib, Lina. Image Politics in the Middle East: The Role of the Visual in Political Struggle. I.B.Tauris, 2012.
Sabri, Sahab, and Saeed Sabri-Matanagh. "The Impact of Information and Communications Technology Infrastructure on the Momentum of Organisational Change." The Journal of Applied Business and Economics 13, no. 4 (2012): 85-95.
Archetti, Cristina. "The impact of new media on diplomatic practice: An evolutionary model of change." The Hague Journal of Diplomacy 7, no. 2 (2012): 181-206.
Montagnese, Alfonso. Impact of Social Media on National Security. Centro Militare di Studi Strategici (Italy), 2012.
Arh, Tanja, Borka Blazic, and Vlado Dimovski. "The impact of technology-enhanced organisational learning on business performance: An empirical study." Journal of East European Management Studies 17, no. 3 (2012): 369-383.
Klaic, Aleksandar, and Anita Peresin. "The Impact of the National Information Security Regulation Framework on Cyber Security in Global Environment." In International Scientific Conference on Corporate Security in Dynamic Global Environment - Challenges and Risks, 85-96. Ljubljana, Slovenia: Institute for Corporative Security Studies, 2012.
Grobler, Martie, Joey Jansen Van Vuuren, and Louise Leenen. "Implementation of a Cyber Security Policy in South Africa: Reflection on Progress and the Way Forward." Council for Scientific and Industrial Research (2012).
Kraan, Wilbert, Steve Lay, and Pierre Gorissen. IMS Question & Test Interoperability Assess-ment Test, Section and Item Information Model., 2012.
Zenn, Jacob. "IMU Reestablishes Bases in Northern Afghanistan." CACI Analyst (2012).
Zhengyuan, Xu. "In the Shadow of Great Powers: A Comparative Study of Various Approaches to Regionalism in Central Asia." Connections: The Quarterly Journal 9, no. 4 (2012): 37-52.
Nakashima, Ellen. "In U.S.-Russia Deal, Nuclear Communication System May Be Used for Cybersecurity." Washington Post (2012).
Increase in Opium Production in Afghanistan Gives Cause for Concern. Tajikistan News-NA “Asia-Plus”, 2012.
Prusty, Nigam. Indian Government Wins Vote on Wal-Mart-type Stores. Reuters, 2012.
Infanterist der Zukunft. Deutsches Heeresamt, 2012.
Mikuž, Ivan. Influence Small State Force Design. Carlisle: United States Army War College, 2012.
Moharana, Chitta Ranjan, Manas Kumar Pal, and Debasish Rout. "Information and Network Security in E-Governance: Perspective and Issues." International Journal of Research in Engineering, IT and Social Sciences 16, no. 1 (2012).

Pages