Export 17815 results:
Tumkevič, Agnija. Tarptautinio bendradarbiavimo ir konflikto potencialas kibernetinėje erdvėje. Vol. Daktaro disertacija. Vilniaus Universitetas, 2019.
Srivastava, Rachit. "Terrorism in Central Asia." Research journal of social sciences 10, no. 7 (2019): 179-185.
Andreev, Metodi. There was nothing in the reports of the special services about Russian espionage and Gebrev’s poisoning. FrogNews, 2019.
Iliev, Ilia. They are pointing to Russia, aiming at Europe. Trud, 2019.
Minchev, Zlatogor, Pavlin Kutinchev, and Ivan Gaydarski. Top 10 live threats to cyberspace in 2019 In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2019.
Traficom – About us., 2019.
Pitman, Lora. The Trojan Horse in Your Head: Cognitive Threats and How to Counter Them In International Studies. Vol. Doctor of Philosophy (PhD). Old Dominion University, 2019.
Waheed, Ahmed W.. "The ‘Truth About Pakistan’: Knowledge Production and Circulation in Think Tanks." In Constructing 'Pakistan' through Knowledge Production in International Relations and Area Studies. Singapore : Palgrave Macmillan, 2019.
Tagarev, Todor. "Understanding Hybrid Influence: Emerging Analysis Frameworks." In DIGILIENCE 2019. Sofia, Bulgaria, 2019.
Özkurt, Fatma Zeynep. "Understanding the Continuity and Change in the European Union’s Policies on the Mediterranean and the MENA Region after the Arab “Spring” Uprisings." Journal of Security Strategies (Güvenlik Stratejileri Dergisi) 15, no. 29 (2019): 43-77.
The Unified Modeling Language (UML) Web Page., 2019.
Uptime Institute., 2019.
Andriichuk, Oleh, Vitaliy Tsyganok, Dmitry Lande, Oleg Chertov, and Yaroslava Porplenko. "Usage of Decision Support Systems for Conflicts Modelling during Information Operations Recognition." In DIGILIENCE 2019., 2019.
Dulschi, Olivia. Utilisation of Security Systems in Public Administration In Conferinței Științifice Internaționale "Contribuția tinerilor cercetători la dezvoltarea administrației publice". Chișinău: Academia de Administare Publică, 2019.
Aaltola, Kirsi, and Petteri Taitto. "Utilising Experiential and Organizational Learning Theories to Improve Human Performance in Cyber Training." Information & Security: An International Journal 43, no. 2 (2019): 123-133.
Bontchev, Vesselin. "A VBA P-Code Disassembler." In DIGILIENCE 2019. Sofia, Bulgaria, 2019.
Verizon Data Breach Investigation Report 2019. Verizon business ready, 2019.
Petrov, Daniel. Vultures of Law and Morality., 2019.
Omelicheva, Mariya, and Lawrence Markowitz. Webs of Corruption: Trafficking and Terrorism in Central Asia. New York: Columbia University Press, 2019.
What are the Top Ten Data Center Best Practices?. TechXact, 2019.
Costigan, Sean, and Greg Gleason. "What If Blockchain Cannot Be Blocked? Cryptocurrency and International Security." Information & Security: An International Journal 43, no. 1 (2019): 13-20.
Boulton, Clint. What is Digital Transformation? A Necessary Disruption. CIO, 2019.
De Groot, Juliana. What is HIPAA Compliance? 2019 HIPAA Requirements. Digital Guardian, 2019.
De Groot, Juliana. What is SOX Compliance? 2019 SOX Requirements & More. Digital Guardian, 2019.
Muddana, Varshita. What is the Future of IoT or Internet of Things in next 5 years?. SoftScript, IoT, Latest News, Marketing Trends, 2019.