Biblio

Export 21362 results:
2012
Wawak, Slawomir. "Information Security Management in Context of Globalization." Journal of the Washington Institute of China Studies 6, no. 1 (2012): 41-52.
Lukorito, Graham Masinde. Information security threats and E-government initiatives at the Kenya Revenue Authority (KRA) In School of business. Vol. Master of Business Administration. University of Nairobi, 2012.
Sahi, Geetanjali, and Sushila Madan. "Information Security Threats in ERP Enabled E-Governance: Challenges and Solutions." In Strategic Enterprise Resource Planning Models for E-Government: Applications and Methodologies, 158-170. IGI Global, 2012.
Information Sharing with non-NATO Entities. NATO Joint Analysis and Lessons Learned Centre, 2012.
Wiredu, Gamel. "Information systems innovation in public organisations: an institutional perspective." Information Technology & People 25, no. 2 (2012): 188-206.
Dimitrov, Tulechka, and Paunova. Information Threats in the Internet, social networks and games.2012 In International Scientific Conference ‘Informatics in the Scientific Knowledge’. Varna, Bulgaria, 2012.
Lukasik, Sebastian H.. " Insurgent Airpower in Historical Perspective: An Introduction and Prospectus for Research." The Historian 74, no. 2 (2012): 217-240 .
Minchev, Z.. Integrated Border Security Aspects: Bulgarian Academic Experience and Development Perspectives In International Conference “The Eastern Partnership: Assessment of Past Achievements and Future Trends”. Bucharest, Romania: Military Publishing House, 2012.
Integrated Research and Industrial Roadmap for European Nanotechnology. Nanofutures, 2012.
Popova, Juliana. Integration of Roma Communities in Bulgaria and Romania. OP “Human Resources Development”, 2012.
Mejias, Roberto. An Integrative Model of Information Security Awareness for Assessing Information Systems Security Risk In Annual Hawaii International Conference on System Sciences., 2012.
Warner, Michael. "Intelligence and Reflexivity: An Invitation to a Dialogue." Intelligence and National Security 27, no. 2 (2012): 167-171.
Wippl, Joseph W.. "Intelligence Exchange Through InterIntel." International Journal of Intelligence and CounterIntelligence 25, no. 1 (2012): 1-18.
Gill, Peter, and Mark Phythian. Intelligence in an Insecure World. Cambridge: Polity, 2012.
Glassman, Michael, and Min Ju Kang. "Intelligence in the internet age: the emergence and evolution of OSINT." Computers in Human Behavior 28, no. 2 (2012): 673-682.
Gill, Peter. "Intelligence, Threat, Risk and the Challenge of Oversight." Intelligence and National Security 27, no. 2 (2012): 206-222.
Intel® Virtualization Technology for Directed I/O (VT-d): Enhancing Intel platforms for efficient virtualization of I/O devices. Software Intel.com, 2012.
Tasevski, Predrag. Interactive Cyber Security Awareness Program. Germany: Lambert Academic Publishing (LAP), 2012.
Zhou, Yan, and Jianxun Li. "Interactive multiple Kalman filters based 3-D target tracking for two airborne platforms with bearings-only measurements." In 2012 24th Chinese Control and Decision Conference, CCDC 2012. Taiyuan; China, 2012.
Reydams, Luc, Jan Wouters, and Cedric Ryngaert. International Prosecutors. Oxford: Oxford University Press, 2012.
International Standards on Combatting Money Laundering and the Financing of Terrorism & Proliferation: The FATF Recommendations. Paris: FATF, 2012.
Calandro, Enrico, Cristoph Stork, and Alison Gillwald. Internet Going Mobile: Internet Access and Usage in 11 African Countries In Research ICT Africa., 2012.
Souter, David, and Monica Kerrets-Makau. Internet Governance in Kenya: An Assessment. ICT Development Associates Ltd, 2012.
Hersent, Olivier, David Boswarthick, and Omar Elloumi. The Internet of Things - Key Applications and Protocols. Chichester, West Sussex,United Kingdom: John Wiley and Sons, 2012.
Internet Security Threat Report In 2011 trends, vol. 17. Symantec, 2012.

Pages