Biblio

Export 21406 results:
2019
von Weizsäcker, Ernst Ulrich, and Anders Wijkman. Come on!: Capitalism, Short-termism, Population and the Destruction of the Planet In A Report to the Club of Rome . New York, 2019.
Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions: 2019 Communication on EU Enlargement Policy. Brussels, 2019.
Simola, Jussi. "Comparative Research of Cybersecurity Information Sharing Models: The Common Cyber Ecosystem of ECHO." In Digital Transformation, Cyber Security and Resilience (DIGILIENCE 2019). Sofia, 2019.
Simola, Jussi. "Comparative Research of Cybersecurity Information Sharing Models." Information & Security: An International Journal 43, no. 2 (2019): 175-195.
Malla, Shrijan Bahadur, Shuichi Hasegawa, and Ranjan Kumar Dahal. "Competency of the Infantry Troops of the Nepalese Army in Disaster Response." Journal of Risk Analysis and Crisis Response 9, no. 2 (2019): 62-73.
Jursík, Miroslav, Michaea Kolářová, and Josef Soukup. "Competition, reproduction ability, and control possibilities of conventional and Clearfield® volunteer oilseed rape in winter wheat." Crop Protection (2019): 30-34.
Jones, Bruce, Jeffrey Feltman, and Will Moreland. Competitive Multilateralism: Adapting Institutions to Meet the New Geopolitical Environment. The Brookings Institution, 2019.
de Carvalho, Rodrigo Monteiro. "Complementaridade ou Dependência? O Dilema da Armênia Pós-Soviética (Complementarity or Dependence? The Dilemma of the Post-Soviet Armenia)." Revista Conjuntura Global 8, no. 2 (2019): 76-96.
Herrera, Luis-Carlos, and Olaf Maennel. "A comprehensive instrument for identifying critical information infrastructure services." International Journal of Critical Infrastructure Protection 25 (2019): 50-61.
Tagarev, Todor, and George Sharkov. Computationally intensive functions in designing and operating distributed cyber secure and resilient systems In 20th International Conference on Computer Systems and Technologies, CompSysTech 2019. Vol. ACM International Conference Proceeding Series. Bulgaria: University of RuseRuse, 2019.
Najgebauer, Andrzej, Ryszard Antkiewicz, Dariusz Pierzchała, and Jarosław Rulka. Computer Based Methods and Tools for Armed Forces Structure Optimization In ISAT 2018: Information Systems Architecture and Technology: Proceedings of 39th International Conference on Information Systems Architecture and Technology – ISAT 2018. Vol. 853. Springer, Cham, 2019.
Najgebauer, Andrzej, Ryszard Antkiewicz, Dariusz Pierzchała, and Jarosław Rulka. Computer Based Methods and Tools for Armed Forces Structure Optimization In Information Systems Architecture and Technology: Proceedings of 39th International Conference on Information Systems Architecture and Technology – ISAT 2018 - Part II. Vol. 653. Springer, 2019.
Lande, Dmytro, Igor Subach, and Artyom Sobolyev. Computer program of social networks content monitoring on cybersecurity - "CyberAggregator" In Certificate of registration of copyright to the work from 31.07.2019. Ukraine, 2019.
The Constitution Protection Bureau (SAB)., 2019.
Saranov, Nikola. "Cooperation Model for Establishing Secure Digital Transformation in Corporations: Overview of Regulatory Issues." Information & Security: An International Journal 43, no. 1 (2019): 98-112.
Larsen, Marie Hjelseth, and Susann Øvretveit. Corruption in the Arms- and Defense Industry: A comparative study of the largest American and European arms dealers. Bergen: Norwegian School of Economics, 2019.
Si, Katherine. Cosco Shipping Port sells port assets to SIPG. Seatrade Maritime, 2019.
CoSoSys Endpoint Protector Web Page., 2019.
Ponemon Institute & Accenture Security. The Cost of Cybercrime, 2019., 2019.
Counterintelligence. Latvian State Security Service, 2019.
Counterterrorism. Latvian State Security Service, 2019.
Ogar, Sarah. Covert Networks: A Comparative Study of Intelligence Techniques Used By Foreign Intelligence Agencies to Weaponize Social Media. Vol. Master of Arts. Baltimore, Maryland: Johns Hopkins University, 2019.
Jeżewski, Rosław. "Cross-domain Coercion as Russia’s Endeavor to Weaken the Eastern Flank of NATO: A Latvian Case Study." Connections: The Quarterly Journal 18, no. 1-2 (2019).
Turčaník, Michal, and Martin Javurek. "Cryptographic Key Generation by Genetic Algorithms." Information & Security: An International Journal 43, no. 1 (2019): 54-61.
Kozina, Andrija. "The Culture of Military School: The Example of the Dr. Franjo Tudjman Croatian Defense Academy." Connections: The Quarterly Journal 18, no. 3 (2019): 45-63.

Pages