Biblio
Export 21401 results:
Legislation seeks to bar NSA tactic in encryption." New York Times (2013).
"Let it be … how it used to be." Ogonek (2013).
"Liberty and Security in a Changing World." Report and Recommendations of The President’s Review Group on Intelligence and Communications Technologies (2013): 81.
"Life after Death: Will the Nunn-Lugar Program Give Way to New Partnership?" Russia in Global Affairs (2013).
"Lithuania." In Handbook of Political Change in Eastern Europe, 125-166., 2013.
"Live Blog: Syria crisis, UN chemical weapons team leaves Syria paving way for attack. Haaretz, 2013.
The local prevention of terrorism in strategy and practice: ‘Contest’ a new era in the fight against terrorism In School of Law,. Vol. PhD in Law. The University of Leeds, 2013.
Locking the bad guys out with asymmetric encryption." Ars Technica (2013).
"Lone Mujahid Pocketbook. Al-Malahem Media, 2013.
A Look at DEA Agent 'Kiki' Camarena's Murder. Fox News You Tube Channel, 2013.
Look Who’s Talking, Dialogue and Conflict Transformation." Critical Studies on Terrorism 6, no. 1 (2013): 219.
""Looking Forward: U.S. National Security Beyond the Wars." In Conference organized by the Center for a New American Security, 56-63. Vol. 189 ., 2013.
Management of security in quantum cryptography." IEEE Communications Magazine 51, no. 8 (2013): 36-41.
"Management Priorities of the Minister of Defence of the Republic of Bulgaria in the 2013 Caretaker Government In CSDM Views. Sofia: Centre for Security and Defence Management, 2013.
Mapping the certification authority for e-government procurement system into eGovAMAN framework." In International Conference on Advanced Computer Science and Information Systems (ICACSIS). Bali, Indonesia: IEEE, 2013.
"Marathon Bombing Suspect, in First Court Appearance, Pleads Not Guilty." The New York Times (2013).
"Maritime Surveillance with GSM Passive Radar: Detection and Tracking of Small Agile Targets." In 14th International Radar Symposium. Dresden, Germany, 2013.
"Martial Law over Flood in Germany. Military Is Deploying In 3 States By Now. Investment-Watch, 2013.
McAfee Lab Threat Report: Third Quarter 2013. McAfee, 2013.
An M-Commerce Security Framework for ICT4D Contexts." In Southern Africa Telecommunication Networks and Applications Conference (SATNAC) 2013. Spier Wine Estate, Stellenbosch, Western Cape, South Africa, 2013.
"