Biblio
Export 21463 results:
Learning Materials and Trend of Using Internet as Reference of Additional Reading in Self-Directed Learning among Distance Learners in Addis Ababa. St. Mary's University, 2015.
The Legacy and Agenda of Hostage Taking. Asia Pacific Foundation, International Policy Assessment Group, 2015.
Legal Strategy for the Sake of Safety in the Field of Leisure Sports." Chosun Law Journal 22, no. 2 (2015): 41-75.
"Lessons Learned from the Russo-Ukrainian War. Vienna, VA: The Potomac Foundation, 2015.
Levels of Cybersecurity Training and Education In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2015.
Leveraging Linguistic Structure for Open Domain Information Extraction In 53rd Annual Meeting of the Association for Computational Linguistics and the 7th In-ternational Joint Conference on Natural Language Processing. Beijing, China, 2015.
List of official definitions as per different countries’ documents. Tallinn, Estonia: NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE), 2015.
Lithuania: Capabilities, Organisations, Policies, and Legislation in crisis management and disaster response In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2015.
Lithuania to Ban Russian TV Channel for ‘Warmongering’. Deutsche Welle, 2015.
Lithuanian Ministry of Interior., 2015.
Lithuanian Red Cross., 2015.
The little-known challenge of maritime cyber security." In 6th International Conference on Information, Intelligence, Systems and Applications (IISA)., 2015.
"On Littoral Warfare." Naval War College Review 68, no. 2 (2015).
"Living the ‘Chinese Dream’ in the ‘Russkiy Mir’: Central Asia between Sino-Russian Strategic Trilemmas?" In Russia, Eurasia and the New Geopolitics of Energy. London: Palgrave Macmillan, 2015.
"The Local Prevention of Terrorism: Strategy and Practice in the Fight Against Terrorism. Palgrave Macmillan, 2015.
Local Resources on Cybercrime In Cybercrime., 2015.
A Look Back at NATO’s 1999 Kosovo Campaign: A Questionably "Legal" but Justifiable Exception?" Connections: The Quarterly Journal 14, no. 4 (2015): 43-55.
"Macedonian Path Towards Cybersecurity." Information & Security: An International Journal 32, no. 2 (2015): 109-119.
"Major challenges in developing a successful e-government: A review on the Sultanate of Oman." Journal of King Saud University - Computer and Information Sciences 27, no. 2 (2015): 230-235.
"Making Jihad or Making Money? Understanding the Transformation of Dagestan’s Jamaats into Organised Crime Groups." Journal of Strategic Studiesm (2015): 1-25.
"Making sense of EU’s conflict management strategy in South Caucasus In European College. Vol. Maste. Tartu: University of Tartu, 2015.
Man who Fought in Syria Detained in Bosnia Over Police Killing. Al Arabiya, 2015.
Management of Information Security and Risk. Programme Specification. City University London, 2015.