Biblio

Export 8458 results:
Filters: Filter is   [Clear All Filters]
2012
Guidetti, Alain. Reshaping the Security Order in Asia-Pacific. Geneva Centre for Security Policy Paper, 2012.
Stoddard, Ed. "The Resource Curse- Resource Nationalism Nexus: Implications for Foreign Markets." Journal of Energy Security (2012).
On the Review of the European Programme for Critical Infrastructure Protection (EPCIP) . Brussels: Commission staff working document, 2012.
Ghonim, Wael. Revolution 2.0. London: Fourth Estate, 2012.
Ghonim, Wael. Revolution 2.0: The Power of the People Is Greater than the People in Power: A Memoir. Boston: Houghton Mifflin Harcourt, 2012.
Rheinmetall and SAAB: Creating Network-Enabled Warfighters. Rheinmetall Defense, 2012.
Giannopoulos, Georgios, Roberto Filippini, and Muriel Schimmer. Risk Assessment Method-ologies for Critical Infrastructure Protection, Part I: A state of the art. Ispra, Italy: European Commission’s Joint Research Centre, 2012.
Pelham, Nicolas. Rivalries for Authority in Libya. NOREF Report , 2012.
Nicoll, Alexander. The Road to Lisbon in Afghanistan to 2015 and Beyond In Adelphi Series 425–26. London: International Institute for Strategic Studies, 2012.
Russia Calls for Cooperation in Combating Child Pornography. Voice Of Russia Radio, 2012.
Clark, Stephen. Russia clears Proton to resume flying in December., 2012.
F. Maloof, Michael. "Russia is Massing Troops on Iran’s Northern Border and Waiting for a Western Attack." Business Insider (9 April 2012 (2012).
Dzutsev, Valery. "Russia Launches Massive Military Redeployment to Dagestan." Eurasia Daily Monitor 9, no. 57 (2012).
Kucera, Joshua. Russia to Host NATO Afghan Transit Hub?. EurasiaNet.org, 2012.
Trenin, Dmitri. The Russian Awakening. Moscow: Carnegie Moscow Center, 2012.
Essers, Loek. Russian Cybercriminals Earned $4.5 Billion in 2011. ComputerWorld, 2012.
Stavridis, James C., and Elton C. Parker. "Sailing the Cyber Sea." Joint Forces Quarterly 65 (2012): 62.
Placek, Kevin. "The San Francisco System: Declining Relevance or Renewed Importance?" Quarterly Access 4, no. 1 (2012): 15-20.
Balzarotti, D. Second Report on Threats on the Future Internet and Research Roadmap, SySSec Consortia., 2012.
SecureDoc™ for Lenovo. WinMagic Data Security, 2012.
Peyrouse, Sébastien, Jos Boonstra, and Marlène Laruelle. Security and Development Approaches to Central Asia. The EU Compared to China and Russia In Working Paper 11. EUCAM, 2012.
Security Annual Report. Cisco, 2012.
Security, Kazakhstan. London: IHS Global Limited, 2012.
Security risk: Sensitive data can be harvested from a PC even if it is in standby mode, experts say. ScienceDaily.com, 2012.
Security threat report 2013. Sophos, 2012.

Страницы