Biblio

Export 21406 results:
0
Ordinance of the Council of Ministers of 15 December 2009 .
S., Gaw, and Felten E.W.. Password Management Strategies For Online Accounts. USA: Symposium on Usable Privacy and Security (SOUPS) 2006.
Gupta, P.. "Pesticide Exposure." Toxicology Consulting Services Inc. 198: 83-90.
Gladkevich, Yury. "Poshel v Gory." Profil.
Shakespeare-Finch, Jane, Ian Shochet, Colette Roos, Cameron Craig, Deanne Maree Armstrong, Ross Young, and Astrid Wurfl. Promoting Posttraumatic Growth in Police Recruits: Preliminary Results of a Randomised Controlled Resilience Intervention Trial In Australian and New Zealand Disaster and Emergency Management Conference: Book of Proceedings. Australia: Association for Sustainability in Business Inc.
Remittance Prices Worldwide: Making Markets More Transparent. The World Bank.
Reply by the Federal Government: Procurement of weapons from the East by the Federal Intelligence Service and transit shipment to friendly states In Bundestag print.
Linkevicius, Linas. "Reset with Russia, but with Reassurance." International Herald Tribune.
McCants, Nicholas. The Resource Allocation Process and the Effects on Cybersecurity Culture In . Vol. Doctor of Information Technology. Capella University.
Douglas, Nadja. "Revising the Framework of Civilian Control." In Public Control of Armed Forces in the Russian Federation, 63-104. Cham: Palgrave Macmillan.
Llanque, Marcus. "The Rhetoric of intellectual Manifestos from the First World War to the War against Terrorism." In The Ashgate Research Companion to the Politics of Democratization in Europe. Ashgate Publishing, Ltd.
"SARS-CoV-1 and SARS-CoV-2 are related but different viruses and produce related but different infections." WHO.
Sato, H., M. Kubo, and A. Namatame. "Sato, H." In Soft Computing and Intelligent Systems (SCIS) and 13th International Symposium on Advanced Intelligent Systems (ISIS), 2012 Joint 6th International Conference on. Kobe: IEEE.
Navrátil, Matej, and Michal Onderco. "Slovakia: Creating and Transforming Civil-Military Relations." In Oxford Research Encyclopedia of Politics.
Kuldeep, Singh, Jøsang Audun, Sadek Ferdous, and Ravishankar Borgaonkar. Spam Filter Optimality Based on Signal Detection Theory In 2nd international conference on Security of information and networks. Famagusta, North Cyprus.
Standards of higher education 1701 “Information Security“.
On the State Program for Transition of the Armed Forces of Ukraine to Manning with Contract Military Servicemen In Decree by the President of Ukraine No. 348/2002 .
Holliday, P.. "SWARMM - a mobility modelling tool for tactical military networks." In Military Communications Conference. San Diego, CA: IEEE.
Shaw, Mark. Typologies of Transnational Organized Crime Groups. Centre for International Crime Prevention, UNODC.
Ugroza terrorizma v Rossii sokhranaetsya [The Terrorist Threat in Russia Remains]. Rosbalt.
Sapolsky, Harvey M., Eugene Gholz, and Caitlin Talmadge. US Defense Politics: The origins of security policy. Routledge.
U.S. Response to Crisis in Kyrgyz Republic, Uzbekistan. U.S. Department of State.
USD 39, 5 billion will be spent on Smart City Technologies in 2016 In Press release by ABI Research.
Adelantado, Martin, and Jean-Michel Mathe. "Using Agent Based Distillation to Explore Issues Related to Asymmetric Warfare.".
Brinkman, Richard, Jeroen Doumen, and Willem Jonker. "Using Secret Sharing for Searching in Encrypted Data." In Workshop on Secure Data Management in a Connected World. Toronto, Canada.

Pages