Biblio

Export 21376 results:
2020
UK Department for Digital, Culture, Media & Sport. Call for Views on Amending the NIS Regulations 2018 In Policy Paper., 2020.
Canadian decision to halt tech exports exposes key weakness in Turkish drone industry. Turkish Minute, 2020.
CareerOneStop., 2020.
François, Camille, and Herbert Lin. "Cartographier un angle mort : la surprise stratégique des opérations informationnelles russes sur les réseaux sociaux en 2016." Hérodote 2, no. 3 (2020): 177-178.
Lal, Bechoo. "Case Study: Attacks and Defence Modelling Approach for Cyber Security." International Journal of Business Management and Administration (IJBMA) 1, no. 1 (2020).
Southern, Nathan Paul, and Lindsey Kennedy. "Central Asian States Can’t Hide the Coronavirus Any Longer. Authoritarian States Have Been Downplaying Numbers. That Won’t Last." Foreign Policy (2020).
Chad to stop Participating in Regional fight against Armed Groups. Aljazeera, 2020.
Ivanova, Petya, and Todor Tagarev. "Challenges and Opportunities for Network Intrusion Detection in a Big Data Environment." In DIGILIENCE 2020., 2020.
Ragozini, Giancarlo, and Maria Prosperina Vitale. Challenges in Social Network Research: Methods and Applications: Lecture Notes in Social Network . Springer, 2020.
Maza, Dingji, Umut Koldaş Kangdim, and Sait Aksit. Challenges of Combating Terrorist Financing in the Lake Chad Region: A Case of Boko Haram., 2020.
Burton, Guy. "China and COVID-19 in MENA." POMEPS Studies 39, no. Special Issue on the COVID-19 Pandemic in the Middle East and North Africa (2020).
Pontes, Rúbia Marcussi. A China na grande estratégia dos Estados Unidos da América: da contenção à histórica política de engajamento In Instituto de Filosofia e Ciências Humanas’. Campinas: Universidade Estadual de Campinas, 2020.
Yu, Sun, and Christian Shepherd. "China Struggles with Sharp Rise in Unemployment." Financial Times (2020).
Yunming, Yan. "Chinese Companies Restarting Most Overseas Projects amid COVID-19 Shows BRI Vitality." Global Times (2020).
Babones, Salvatore. "The ‘Chinese Virus’ Spread Along the New Silk Road." Foreign Policy (2020).
CIO.gov., 2020.
Circular polarization. Wikipedia, 2020.
Bertolino, Antonia, Antonello Calabrò, Eda Marchetti, Anton Cervantes Sala, Guiomar Tuñón de Hita, Ilie Daniel Ghe Pop, and Varun Gowtham. "Cloud testing automation: industrial needs and ElasTest response." IET Software 14, no. 5 (2020).
Mygal, Galyna, and Valeriy Mygal. "Cognitive and Ergonomic Aspects Human Interactions with a Computer." Радіоелектронні І Комп’ютерні Системи 1, no. 93 (2020).
Monev, Veselin. "Cognitive Biases in the Information Security Realm: Determinants, Examples and Mitigation." Information & Security: An International Journal 44 (2020): 27-37.
Rudd, Kevin. "The Coming Post-COVID Anarchy: The Pandemic Bodes Ill for Both American and Chinese Power – and for the Global Power." Foreign Affairs (2020).
Common Language Security Incident Taxonomy., 2020.
Commission, European. Communication from the Commission on the EU Security Union Strategy. Brussels, 2020.
G. Ramirez-Hernandez, Renée. Community College Software Deployment Success Rate: A Delphi Qualitative Case Study In Information Systems and Technology. Vol. Doctor of Management. University of Phoenix , 2020.
Community Cyber Security Maturity Model (CCSMM). Center for Infrastructure Assurance and Security (CIAS) at The University of Texas at San Antonio (UTSA), 2020.

Pages