Biblio

Export 21400 results:
2014
Guidelines for Resilience Systems Analysis: How to Analyse Risk and Build a Roadmap to Resilience. OECD Publishing, 2014.
Guidelines for Smart Grid Cybersecurity: Privacy and the Smart Grid. Vol. 2. National Institute of Standards and Technology, 2014.
Guidelines of the Minister of National Defence for 2014–2019., 2014.
Dolan, Chris. "Has Patriarchy Been Stealing the Feminists’ Clothes? Conflict-Related Sexual Violence and UN Security Council Resolutions." IDS Bulletin 45 , no. 1 (2014).
Fjäder, Christian. "he Nation-State, National Security and Resilience in the Age of Globalisation." Resilience 2, no. 2 (2014): 114-129.
Ravish, Deepika, Nayana R. Shenoy, K. Shanthi, and S. Nisargh. Heart function monitoring, prediction and prevention of heart attacks: Using artificial neural networks In 2014 International Conference on Contemporary Computing and Informatics (IC3I)., 2014.
Heavy metals in the components of the environment Mariupol City: Ecological and geochemical aspects (in Ukrainian). Kiev: Interservis, 2014.
Jamah, Ally. Heavy-handed Counter-Terrorism Tactics Added Pepper to Injury This Year. Standard Digital News, 2014.
Masi, Alessandria. "Here’s How ISIS Recruits Westerners." Business Insider (2014).
Bienaimé, Pierre. "Here’s Why So Many of Tunisia’s Youth Are Drawn to ISIS." Business Insider, last modified (2014).
Mantoux, Stéphane. Hide These Jihadists That I Can’t See: The French Volunteers In Syria. Jihadology, 2014.
High Representative of the Union for Foreign Affairs and Security Policy., 2014.
Barlow, Caleb. "Highlights and Insights." In RSA 2014 Conference., 2014.
How a Georgian sergeant became a Jihad leader in Iraq. Vol. 8 July 2014. BBC (Russian Service), 2014.
Karadsheh, Jomana, Jim Sciutto, and Laura Smith-Spark. How Foreign Fighters Are Swelling ISIS Ranks in Startling Numbers. CNN, 2014.
Ajbaili, Mustapha. How ISIS Conquered Social Media. Al Arabiya News, 2014.
J.M., Berger. How ISIS Games Twitter., 2014.
Pomerantsev, Peter. "How Russia Is Revolutionizing Information Warfare." Defense One (2014).
Read, Oliver. "How the 2010 Attack on Google Changed the US Government’s Threat Perception of Economic Cyber Espionage." In Cyberspace and International Relations, 203-230 . Berlin, Heidelberg : Springer, 2014.
Dokos, Thanos. "How the EU got it so Wrong in Ukraine." Europe’s World (2014).
Galeotti, Mark. "How the Invasion of Ukraine Is Shaking Up the Global Crime Scene." Vice News (2014).
Nuriyev, Elkhan. "How the West Helps Putin Fulfill His CIS Strategy." The Moscow Times (2014).
Bhalla, Gaurav. "How to plan and manage a project to co-create value with stakeholders." Strategy & Leadership 42, no. 2 (2014): 19-25.
Heiges, Mike, Rob Bever, and Kyle Carnahan. How to Safely Flight Test a UAV Subject to Cyber-Attacks In Cyber Defence Situation Awareness Symposium (STO-MP-IST-999), ., 2014.
HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack. HP News, 2014.

Pages