Show simple item record

dc.contributor.authorLangø, Hans-Inge Giske
dc.date.accessioned2015-02-19T12:26:08Z
dc.date.accessioned2015-02-24T12:30:00Z
dc.date.available2015-02-19T12:26:08Z
dc.date.available2015-02-24T12:30:00Z
dc.date.issued2013
dc.identifier.citationNUPI-notat. 36 p. NUPI, 2013nb_NO
dc.identifier.urihttp://hdl.handle.net/11250/277537
dc.description-nb_NO
dc.language.isoengnb_NO
dc.relation.ispartofseriesNUPI-notat;820
dc.rightsNavngivelse-DelPåSammeVilkår 3.0 Norge*
dc.rights.urihttp://creativecommons.org/licenses/by-sa/3.0/no/*
dc.subjectSikkerhetspolitikknb_NO
dc.subjectForsvarnb_NO
dc.titleSlaying Cyber Dragons: Competing Academic Approaches to Cyber Securitynb_NO
dc.typeWorking Papernb_NO
dc.date.updated2015-02-19T12:26:08Z
dc.identifier.cristin1224421
dc.subject.keywordForsvar / Defence
dc.subject.keywordSikkerhetspolitikk / Security policies


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

Navngivelse-DelPåSammeVilkår 3.0 Norge
Except where otherwise noted, this item's license is described as Navngivelse-DelPåSammeVilkår 3.0 Norge