Biblio

Export 8454 results:
2012
Ghonim, Wael. Revolution 2.0: The Power of the People Is Greater than the People in Power: A Memoir. Boston: Houghton Mifflin Harcourt, 2012.
Rheinmetall and SAAB: Creating Network-Enabled Warfighters. Rheinmetall Defense, 2012.
Giannopoulos, Georgios, Roberto Filippini, and Muriel Schimmer. Risk Assessment Method-ologies for Critical Infrastructure Protection, Part I: A state of the art. Ispra, Italy: European Commission’s Joint Research Centre, 2012.
Pelham, Nicolas. Rivalries for Authority in Libya. NOREF Report , 2012.
Nicoll, Alexander. The Road to Lisbon in Afghanistan to 2015 and Beyond In Adelphi Series 425–26. London: International Institute for Strategic Studies, 2012.
Russia Calls for Cooperation in Combating Child Pornography. Voice Of Russia Radio, 2012.
Clark, Stephen. Russia clears Proton to resume flying in December., 2012.
F. Maloof, Michael. "Russia is Massing Troops on Iran’s Northern Border and Waiting for a Western Attack." Business Insider (9 April 2012 (2012).
Dzutsev, Valery. "Russia Launches Massive Military Redeployment to Dagestan." Eurasia Daily Monitor 9, no. 57 (2012).
Kucera, Joshua. Russia to Host NATO Afghan Transit Hub?. EurasiaNet.org, 2012.
Trenin, Dmitri. The Russian Awakening. Moscow: Carnegie Moscow Center, 2012.
Essers, Loek. Russian Cybercriminals Earned $4.5 Billion in 2011. ComputerWorld, 2012.
Stavridis, James C., and Elton C. Parker. "Sailing the Cyber Sea." Joint Forces Quarterly 65 (2012): 62.
Placek, Kevin. "The San Francisco System: Declining Relevance or Renewed Importance?" Quarterly Access 4, no. 1 (2012): 15-20.
Balzarotti, D. Second Report on Threats on the Future Internet and Research Roadmap, SySSec Consortia., 2012.
SecureDoc™ for Lenovo. WinMagic Data Security, 2012.
Peyrouse, Sébastien, Jos Boonstra, and Marlène Laruelle. Security and Development Approaches to Central Asia. The EU Compared to China and Russia In Working Paper 11. EUCAM, 2012.
Security Annual Report. Cisco, 2012.
Security, Kazakhstan. London: IHS Global Limited, 2012.
Security risk: Sensitive data can be harvested from a PC even if it is in standby mode, experts say. ScienceDaily.com, 2012.
Security threat report 2013. Sophos, 2012.
Tagarev, Todor, and Velichka Milina. "Shaping Energy Security Policy in Uncertainty." In International conference "Energy Security - National, Regional and Euroatlantic Frameworks". Sofia, 2012.
Cohen, Gili. Sinai Peacekeeping Force Commander Warns of Weapons Smuggling to Gaza. Haaretz, 2012.
The situation in the Syrian Arab Republic In Resolution adopted by the General Assembly., 2012.
Six-Point Proposal of the Joint Special Envoy of the United Nations and the League of Arab States In Annex to S/RES/2042 (2012)., 2012.

Страницы