Biblio

Export 21407 results:
2017
Boyes, Hugh, and Roy Isbell. Code of Practice Cybersecurity for Ships. London: Institution of Engineering and Technology, 2017.
Greif, Avner, and Joel Mokyr. "Cognitive Rules, Institutions, and Economic Growth: Douglass North and Beyond." Journal of Institutional Economics 13, no. 1 (2017): 25-52.
Chanturiya, Kazbek. Collective Responsibility in Chechnya; An Ineffective Method of Influence. OC Media, 2017.
Combined Joint Operations from the Sea, Centre of Excellence (CJOS COE)., 2017.
Samovar, Larry A., Richard E. Porter, Edwin R. McDaniel, and Carolyn Sexton Roy. Communication Between Cultures. 9th ed. Boston, MA: Cengage Learning, 2017.
Sjelin, Natalie, and Gregory White. "The Community Cyber Security Maturity Model." In Cyber-Physical Security. Protecting Critical Infrastructure, 161-183. Cham, Switzerland: Springer, 2017.
Nikolic, Nebojsa. Comparative Review of Hybrid Warfare and Special Warfare In International Scientific Conference “Archibald Reiss Days”. Belgrade, 2017.
Rea-Guaman, Angel Marcelo, Tomás San Feliu, Jose A. Calvo-Manzano, and Isaac Daniel Sanchez-Garcia. "Comparative Study of Cybersecurity Capability Maturity Models." In Software Process Improvement and Capability Determination, 100-113. Cham, Switzerland: Springer, 2017.
Bojilov, Ljudmil, and Pavlina Konstantinova. A Comparison study of two approaches for determining ranked set of assignments for multitarget tracking., 2017.
Širec, Karin. "The Competitiveness of Established Entrepreneurs in Balkan Countries." World Review of Entrepreneurship, Management and Sust. Development 13, no. 2/3 (2017): 141.
Zhdanova, Mariia, and Dariya Orlova. Computational Propaganda in Ukraine: Caught between external threats and internal challenges In Working Paper 2017.9 . Oxford, UK: Project on Computational Propaganda, 2017.
Urban, Rudolf, Alena Oulehlová, and Hana Malachová. "Computer Simulation - Efficient Tool Of Crisis Management." In International Conference KNOWLEDGE-BASED ORGANIZATION ., 2017.
The Concept of Building a State Critical Infrastructure Protection System in Ukraine (in Ukrainian) In Resolution of the Cabinet Ministers of Ukraine ., 2017.
Gaydarski, I., and Zlatogor Minchev. Conceptual Modeling of an Information Security System and Its Validation through DLP Systems In BISEC. Belgrade, Serbia, 2017.
Jacob, Deden Witarsyah, Mohd Farhan M. D. Fudzee, and Mohamad Aizi Salamat. "A Conceptual Study on Generic End Users Adoption of e-Government Services." International Journal on Advanced Science, Engineering and Information Technology 7, no. 3 (2017).
Sánchez, Luis, and Ross Mitchell. "Conceptualizing impact assessment as a learning process." Environmental Impact Assessment Review 62 (2017): 195-204.
Crowe, Allison, Scott J. Glass, Mandee F. Lancaster, Justin M. Raines, and Megan R. Waggy. "A Content Analysis of Psychological Resilience among First Responders and the General Population." SAGE Open 1 (2017).
Galeotti, Mark. Controlling Chaos: How Russia Manages Its Political War in Europe In Policy Brief. London: European Council on Foreign Relations, 2017.
. "Converted Hindus, Engineers among 52 ISIS Terrorists Held by NIA." The Indian Express (2017).
Kieffer, Brady, Morteza Babaie, Shivam Kalra, and H.R.Tizhoosh. Convolutional neural networks for histopathology image classification: Training vs. using pre-trained networks In 2017 Seventh International Conference on Image Processing Theory, Tools and Applications (IPTA)., 2017.
Yague-Martinez, Nestor, Francesco De Zan, and Pau Prats-Iraola. "Coregistration of Interferometric Stacks of Sentinel-1 TOPS Data." Geoscience and Remote Sensing Letters IEEE 14, no. 7 (2017): 1002-1006.
Counter Improvised Explosive Devices - Centre Of Excelence (C-IED COE)., 2017.
Kirimi, Frank Mwiti. Countering Terrorism in the Horn of Africa: The Role of Public Diplomacy In Institute of Diplomacy and International Studies. Vol. Master Of Arts In Diplomacy. University of Nairobi, 2017.
Obamamoye, Babatunde F.. "Counter-terrorism, Multinational Joint Task Force and the Missing Components." African Identities 15, no. 4 (2017): 428-440.
Tukiman, Norbaiti, Norhaiza Ahmad, Suhana Mohamed, Zarith Sofiah Othman, CT Munirah Ni Shafee, and Zairi Ismael Rizman. "Credit Card Detection System Based on Ridit Approach." International Journal on Advanced Science, Engineering and Information Technology 7, no. 6 (2017): 2071-2077.

Pages