Biblio
Export 21470 results:
Unconventional Gas Resources:A Transatlantic Shale Alliance?" In Transatlantic Energy Futures: Strategic Perspectives on Energy Security, Cli¬mate Change and New Technologies in Europe and the United States. Washington, D.C.: Center for Transatlantic Relations, Johns Hopkins University–SAIS, 2012.
"Understanding DMA Malware In Security in Telecommunications. Technische Universitat Berlin, 2012.
Understanding Gender Mainstreaming in Modern Law Enforcement." Connections: The Quarterly Journal 11, no. 2 (2012): 87-94.
"Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory." Computers& Security 31, no. 1 (2012): 83-95.
"Understanding Lone Wolf Terrorism: Global Patterns, Motivations and Prevention. Dordrecht: Springer, 2012.
Understanding Processor (% Processor Time) and Process (%Processor Time). Microsoft TechNet Articles, 2012.
Understanding the Threat of Radical Islam. Broomall, PA: National Highlights, 2012.
United NatE-Government. Survey 2012. E-Government for the People. United Nations, 2012.
The United Nations SSR Perspective. United Nations, Department of Peacekeeping Operations, Office of Rule of Law and Security Institutions, Security Sector Reform Unit, 2012.
Unsafe Roads." SA GlobalAffairs (2012).
"US Gas Pipelines under Cyber Attack." Says DHS (2012).
"U.S., Israel developed Flame computer virus to slow Iranian nuclear efforts." The Washington Post (2012).
" U.S. Should Back up Its Proclaimed ‘Good Intentions’ in Asia-Pacific With Action. Xinhua News Agency, 2012.
U.S. Should Not Muddy the Waters Over the South China Seas. People’s Daily, 2012.
U.S. Should Treat China and Chinese Military Objectively and Rationally: Defence Ministry. Ministry of National Defense, P. R. China, 2012.
U.S. to Overtake Saudi as Top Oil Producer: IEA. Reuters, 2012.
The U.S. Will Help Uzbekistan to Disperse Demonstrators ‘Not Lethally’. Defense and Security (Russia), 2012.
Usage of Service-Oriented Architecture for Developing Prototype of Intelligence Information System." TEM Journal – Technology education management informatics 1, no. 4 (2012).
"The Use of Internet for Terrorist Purposes. New York: United Nations, United Nations Office on Drugs and Crime, 2012.
Use of Mobile Applications in Security and Safety Systems." Information & Security: An International Journal 28, no. 1 (2012): 146-153.
"