Biblio
Export 21434 results:
Hybrid War in History." In Hybrid Warfare: Fighting Complex Opponents from the Ancient World to the Present. Cambridge: Cambridge University Press, 2012.
"Hybrid Warfare: Fighting Complex Opponents from the Ancient World to the Present. Cambridge: Cambridge University Press, 2012.
IBM Incorporated: An exploration of an Egyptian work ethic as constructed by South African expatriates working in Cairo. Vol. , Master of Arts (Sociology). University of Stellenbosch, 2012.
Identifikasi Plat Nomor Kendaraan Secara Off-Line Berbasis Pengolahan Citra dan Jaringan Syaraf Tiruan." Electrician – Jurnal Rekayasa dan Teknologi Elektro, no. 2 (2012).
"Identifying the Reasons for Failures in Large-Scale Systems." Information & Security: An International Journal 28, no. 2 (2012): 236-247.
"Identity, Motives of Intruders onto Georgian Territory Remain Unclear. Radio Free Europe/Radio Liberty, 2012.
The Impact of Information and Communications Technology Infrastructure on the Momentum of Organisational Change." The Journal of Applied Business and Economics 13, no. 4 (2012): 85-95.
"The impact of new media on diplomatic practice: An evolutionary model of change." The Hague Journal of Diplomacy 7, no. 2 (2012): 181-206.
"Impact of Social Media on National Security. Centro Militare di Studi Strategici (Italy), 2012.
The impact of technology-enhanced organisational learning on business performance: An empirical study." Journal of East European Management Studies 17, no. 3 (2012): 369-383.
"The Impact of the National Information Security Regulation Framework on Cyber Security in Global Environment." In International Scientific Conference on Corporate Security in Dynamic Global Environment - Challenges and Risks, 85-96. Ljubljana, Slovenia: Institute for Corporative Security Studies, 2012.
"Implementation of a Cyber Security Policy in South Africa: Reflection on Progress and the Way Forward." Council for Scientific and Industrial Research (2012).
" IMU Reestablishes Bases in Northern Afghanistan." CACI Analyst (2012).
"In the Shadow of Great Powers: A Comparative Study of Various Approaches to Regionalism in Central Asia." Connections: The Quarterly Journal 9, no. 4 (2012): 37-52.
"In U.S.-Russia Deal, Nuclear Communication System May Be Used for Cybersecurity." Washington Post (2012).
"Increase in Opium Production in Afghanistan Gives Cause for Concern. Tajikistan News-NA “Asia-Plus”, 2012.
Indian Government Wins Vote on Wal-Mart-type Stores. Reuters, 2012.
Infanterist der Zukunft. Deutsches Heeresamt, 2012.
Influence Small State Force Design. Carlisle: United States Army War College, 2012.
Information and Network Security in E-Governance: Perspective and Issues." International Journal of Research in Engineering, IT and Social Sciences 16, no. 1 (2012).
"Information Security Management in Context of Globalization." Journal of the Washington Institute of China Studies 6, no. 1 (2012): 41-52.
"Information security threats and E-government initiatives at the Kenya Revenue Authority (KRA) In School of business. Vol. Master of Business Administration. University of Nairobi, 2012.