Biblio
Export 21441 results:
Information technology – Security techniques – Information security management systems – Requirement., 2013.
The Innovative Model of the Virtual Development Office for Collaborative Networked Enterprises: The GPT Network Case Study." International Journal of Computer Integrated Manufacturing 26, no. (1-2) (2013): 41-54.
"Insecurity: Nigerian Army to Court Martial 17 Soldiers Who Erred in Peace Operations." DailyPost (2013).
"Inside GCHQ: how US pays Britain’s spy agency £100m for a very special relationship." Guardian (2013): 1-2.
""Inside the Files: when did we give our consent to a secret state?" Guardian (2013): 37.
Institucionalizacija Saradnje u Bezbednosti u Evropskoj Uniji." Bezbednost, Beograd 55, no. 3 (2013): 21-35.
"Integrated TaaS platform for mobile development: Architecture solutions." In 8th International Workshop on Automation of Software Test (AST). San Francisco, CA, USA , 2013.
"The Integration of a Gender Perspective in the Sierra Leone Police . Geneva: DCAF, 2013.
On Integrity of Intelligence in Countries of Eastern Europe." Information & Security: An International Journal 30, no. 1 (2013): 55-63.
"Intelligence assessment. Wikipedia, 2013.
Intelligence Games: Comparing the Intelligence Capabilities of Law Enforcement Agencies and Drug Trafficking Enterprises." International Journal of Intelligence and CounterIntelligence (2013): 213.
"The Intelligence War on Terrorism." Intelligence and National Security 29, no. 6 (2013): 847.
"Intelligent Intrusion Detection Prevention Systems." Information & Security: An International Journal 26, no. 2 (2013): 109-119.
""Intelligent Oversight." Guardian (2013): 13.
International Intelligence Cooperation against Terrorist Targets – Phase II." In The Dangerous Landscape, 133-151., 2013.
"International Law of Cyber Operations. NATO Cooperative Cyber Defense Centre of Excellence Web Site, 2013.
International Terrorism and International Tourism." In The Dangerous Landscape, 211-219., 2013.
"The Internet, Cross-Border Data Flows and International Trade." SSRN Electronic Journal (2013).
"Internet Forensics and Combating Terrorism." In The Dangerous Landscape, 37-45., 2013.
"Internet Riyou ni okeru Tsushin no Himitsu [Secrecy of communication in the Use of the Internet]." Science of Information Security 5, no. 1 (2013): 33.
"Internet Science Risk, Risk Perception, and Cyberwar." Network Architectures and Services (2013).
"Interview of State Secretary-Deputy Minister of Foreign Affairs of Russia G.B. Karasin in Rossijskaya gazeta, 269-13-02-2013. Vol. 13 February 2013. Official website of the Russian Ministry of Foreign Affairs, 2013.
Interview with Kyrgyz Minister of Defense Taalaybek Omuraliev. Radio Azzatyk, 2013.