Export 17284 results:
Thomson, Iain. Sinister Secret Backdoor Found in Networking Gear Perfect for Government Espionage: The Chinese are – Oh no, wait, it's Cisco again. The Register, 2019.
Beskow, David M., and Kathleen M. Carley. "Social Cybersecurity An Emerging National Security Requirement." Military Review (2019).
Bergh, Arild. Social Network Centric Warfare – Understanding Influence Operations in Social Media In FFI-Rapport. Norwegian Defence Research Establishment (FFI) , 2019.
SophosLabs 2019 Threat Report. Sophos, 2019.
State e-Government Agency., 2019.
Smith, Paul Alan. "Strategy Development and Implementation in a Complex Multi-National it Organisation." Information & Security: An International Journal 42 (2019).
Sestrimski, Borislav. "Study on the Level of Cybersecurity and the Mechanisms for Citizens' Contribution to Preventive Policies." In DIGILIENCE 2019. Sofia, Bulgaria, 2019.
SysSec Red Book Web Page., 2019.
Zaslavskyi, Volodymyr, and Maya Pasichna. "System Approach Towards the Creation of Secure and Resilient Information Technologies in the Energy Sector." Information & Security: An International Journal 43, no. 3 (2019): 318-330.
Shchoholiev, Maksym, and Violeta Tretynyk. "The System of Operative Determination of the Level of Tension in Society Based on Data from Social Networks." Information & Security: An International Journal 43, no. 3 (2019): 375-382.
Pernin, Christopher G., Jakub P. Hlavka, Matthew E. Boyer, John Gordon, IV, Michael Lerario, Jan Osburg, Michael Shurkin, and Daniel C. Gibson. Targeted interoperability: A new imperative for multinational operations. RAND Corporation, 2019.
Tumkevič, Agnija. Tarptautinio bendradarbiavimo ir konflikto potencialas kibernetinėje erdvėje. Vol. Daktaro disertacija. Vilniaus Universitetas, 2019.
Srivastava, Rachit. "Terrorism in Central Asia." Research journal of social sciences 10, no. 7 (2019): 179-185.
Minchev, Zlatogor, Pavlin Kutinchev, and Ivan Gaydarski. Top 10 live threats to cyberspace in 2019 In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2019.
Pitman, Lora. The Trojan Horse in Your Head: Cognitive Threats and How to Counter Them In International Studies. Vol. Doctor of Philosophy (PhD). Old Dominion University, 2019.
Tagarev, Todor. "Understanding Hybrid Influence: Emerging Analysis Frameworks." In DIGILIENCE 2019. Sofia, Bulgaria, 2019.
Özkurt, Fatma Zeynep. "Understanding the Continuity and Change in the European Union’s Policies on the Mediterranean and the MENA Region after the Arab “Spring” Uprisings." Journal of Security Strategies (Güvenlik Stratejileri Dergisi) 15, no. 29 (2019): 43-77.
The Unified Modeling Language (UML) Web Page., 2019.
Andriichuk, Oleh, Vitaliy Tsyganok, Dmitry Lande, Oleg Chertov, and Yaroslava Porplenko. "Usage of Decision Support Systems for Conflicts Modelling during Information Operations Recognition." In DIGILIENCE 2019., 2019.
Dulschi, Olivia. Utilisation of Security Systems in Public Administration In Conferinței Științifice Internaționale "Contribuția tinerilor cercetători la dezvoltarea administrației publice". Chișinău: Academia de Administare Publică, 2019.
Aaltola, Kirsi, and Petteri Taitto. "Utilising Experiential and Organizational Learning Theories to Improve Human Performance in Cyber Training." Information & Security: An International Journal 43, no. 2 (2019): 123-133.
Bontchev, Vesselin. "A VBA P-Code Disassembler." In DIGILIENCE 2019. Sofia, Bulgaria, 2019.
Omelicheva, Mariya, and Lawrence Markowitz. Webs of Corruption: Trafficking and Terrorism in Central Asia. New York: Columbia University Press, 2019.
Costigan, Sean, and Greg Gleason. "What If Blockchain Cannot Be Blocked? Cryptocurrency and International Security." Information & Security: An International Journal 43, no. 1 (2019): 13-20.
De Groot, Juliana. What is HIPAA Compliance? 2019 HIPAA Requirements. Digital Guardian, 2019.