Biblio

Export 21376 results:
2015
Sinai, Joshua. "The Terrorist Threats Against Russia and its Counterterrorism Response Measures." Connections: The Quarterly Journal 14, no. 4 (2015): 95-101.
van Groningen, A. Terroristen 2.0. Het gebruik van internet door terroristische groepen in het sociale media-tijdperk In Faculty of Humanities Theses. Vol. Master thesis., 2015.
Terroryzm morski – niedoceniane zagrożenie. Wywiad z Sebastianem Kalitowskim., 2015.
Graceffo, Antonio. Testing Assumptions in Terrorism. Shanghai : Jiaotong University, 2015.
Starov, Oleksii, Sergiy Vilkomir, Anatoliy Gorbenko, and Vyacheslav Kharchenko. "Testing-as-a-Service for Mobile Applications: State-of-the-Art Survey." In Dependability Problems of Complex Information Systems. Vol. 307. Cham: Springer, 2015.
Werder, Kelly P.. "A Theoretical Framework for Strategic Messaging." In The Routledge Handbook of Strategic Communication, 278. New York, London: Routledge, Taylor and Francis Group, 2015.
Steinberg, Valery E.. Theory and practice of multi-dimensional teaching technology . Moscow: National education, 2015.
Requarth, Tim. "This is Your Brain. This Is Your Brain as a Weapon." Foreign Policy (2015).
van Gulik, Gauri. Time for Europe to End the Refugee Shame. Amnesty International, 2015.
Dobbins, James, and Carter Malkasian. "Time to Negotiate in Afghanistan: How to Talk to the Taliban." Foreign Affairs 94, no. 4 (2015): 55.
Galeotti, Mark. Time to Think About Hybrid Defense. War on the Rocks, 2015.
Rempel, Mark. A time-driven approach to capability costing In Scientific Report. Defence Research and Development Canada, 2015.
Buriro, Attaullah, Bruno Crispo, Filippo Frari, and Konrad Wrona. "Touchstroke: Smartphone User Authentication Based on Touch-Typing Biometrics." In New Trends in Image Analysis and Processing − ICIAP 2015 Workshops. Cham: Springer, 2015.
Hamida, Yaou, Baina Amine, and Bellafkih Mostafa. "Toward resilience management in critical information infrastructure." In 2015 5th World Congress on Information and Communication Technologies (WICT). Marrakech, Morocco : IEEE, 2015.
Bahiti, Rovena, and Jona Josifi. "Towards a More Resilient Cyberspace: The Case of Albania." Information & Security: An International Journal 32, no. 2 (2015): 120-130.
Anthony, an, Camille Grand, and Patricia Lewis. Towards a new European security strategy? Assessing the impact of changes in the global security environment. Luxembourg: Publications Office, 2015.
Towards Human Resilience: Sustaining MDG Progress in an Age of Economic Uncertainty In United Nations Development Programme., 2015.
Grycuk, Y., and V. Girman. Training of Information Security in Educational Institutions of Ukraine., 2015.
Nagyfejeo, Eva. "Transatlantic collaboration in countering cyberterrorism." In Terrorism Online: Politics, Law and Technology., 2015.
Solingen, Etel. "Transcending disciplinary divide/s." In International Relations Theory and a Changing Middle East. Project on Middle East Political Science Studies, 2015.
Dycka, L. "Transnistrian Conflict in the Light of Crisis on Ukraine, ." Research and Science Today 9, no. 74 (2015).
Transparent Governance for Greater Energy Security in CEE In Policy Brief., 2015.
Trusted Networks Initiative., 2015.
Rademaker, Michel, and Marc Gauw. "Trusted Networks Initiative: The Netherlands’ Response to DDoS Attacks." Information & Security: An International Journal 32, no. 1 (2015): 65-70.
Tunisian Youth at Forefront of Syria’s Foreign Fighters. Middle East Eye, 2015.

Pages