Biblio

Export 21400 results:
2014
Sidoran, James. Information Assurance/Cyber Defence Research Framework In Technical Report. Paris: NATO Science and Technology Organization, 2014.
Information from the State Financial Monitoring Service., 2014.
GAO), United States Gov. Information Security Agencies Need to Improve Cyber Incident Response Practices., 2014.
Lebek, Benedict, Jörg Uffen, Markus Neumann, Bernd Hohler, and Michael Breitner. "Information Security Awareness and Behavior: A Theory-Based Literature Review." Management Research Review 37, no. 12 (2014).
Cheung, Simon K. S.. Information Security Management for Higher Education Institutions In Intelligent Data analysis and its Applications, Proceeding of the First Euro-China Conference on Intelligent Data Analysis and Applications. Vol. I. Shenzhen, China, 2014.
Wu, Ing-Long, Cheng-Hung Chuang, and Chien-Hua Hsu. "Information Sharing and Collaborative Behaviours in Enabling Supply Chain Performance: A Social Exchange Perspective." International Journal of Production Economics 148 (2014): 122-132.
Shalamanov, Velizar. Information technologies for good governance in defence, security, and the public sector: Experience and outlook In CSDM Views. Sofia: Centre for Security and Defence Management, 2014.
Hawramy, Fazel, Shalaw Mohammed, and Luke Harding. "Inside Islamic State’s Oil Empire: How Captured Oilfields Fuel Isis Insurgency." The Guardian (2014).
Goldman, Adam, and Julie Tate. "Inside the FBI’s Secret Relationship with the Military’s Special Operations." Washington Post (2014).
Gertz, Bill. "Inside the Ring: Cybercom’s Michael Rogers confirms Russia conducted cyber-attacks against Ukraine." The Washington Times (2014).
Instruction # 8121z 915 of 1 December 2014 on the conditions and procedures for performing operational protection during floods. State Gazette 101 (9 December 2014), 2014.
Takako, Sato. "Intaractive Multimadial Education System (IMES) for the interactive distance education [in Japanese] ." The journal of Sagami Women's University 78 (2014).
G Kumar, Saroj, Debasish Ghose, and A Vengadarajan. "An integrated estimation/guidance approach for seeker-less interceptors." Journal of Aerospace Engineering 229, no. 5 (2014): 891-905.
Tagarev, Todor. "Intelligence, Crime and Cybersecurity." Information & Security: An International Journal 31 (2014): 05-06.
Sibilla, Gustavo. "Intelligence for a safe city model." Information & Security: An International Journal 30, no. 2 (2014): 101-120.
Zeman, Petr. "Intelligence Services of the Czech Republic: Current Legal Status and Its Development." Information & Security: An International Journal 30, no. 2 (2014): 67-84.
Masete, Naledi Thabang, and Jacques Clarence Duvenhage. "(Inter) national standards on money laundering with regard to the FATF recommendation." International Journal of Public Law and Policy 4, no. 1 (2014).
Lewis, David. International Engagement and the Contested State in Contemporary Armenia In Working Paper., 2014.
Trochowska, Kamila. "International Experiences in the Operationalization of Culture for Military Operations—Field Research Results." Connections: The Quarterly Journal 13, no. 3 (2014): 83-103.
International Expert for Preparation of an Assessment Study for the Requirements for Preparation of a National Cyber Security Strategy. UNDP, 2014.
International Telecommunication Union. Statistics and Database., 2014.
Internet Usage Statistics for Africa In World Internet Statistics., 2014.
Ortagus, Megan Leann. The Internet's Impacts on Power Differentials in Security and Conflict In Global Security Studies. Vol. Masters. Johns Hopkins University, 2014.
Prezelj, Iztok. "Inter-Organizational Cooperation and Coordination in the Fight against Terrorism: From Undisputable Necessity to Paradoxical Challenges." Comparative Strategy 33, no. 4 (2014): 329.
Hegghammer, Thomas. "Interpersonal Trust on Jihadi Internet Forums." In Fight, Flight, Mimic: Identity Signalling in Armed Con icts, forthcoming., 2014.

Pages