Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
41 Kuruma Siber Savaş ilan Edildi: Siber Savaş Alarmı! (War Declared on 41 Agencies: Alarm Bell for Cyber War!)
. BT Haber.com, 2011.
"
2. Ulusal Siber Güvenlik Tatbikatı Başarıyla Tamamlandı (Second National Cyber Security Exercise Proves Success)
." In
The Scientific and Technological Research Council of Turkey/TÜBİTAK
., 2013.
National Cyber Security Strategy and 2013-2014 Action Plan
. Republic of Turkey Ministry of Transport, Maritime Affairs and Communications, 2013.
Official Gazette
., 2013.
Kaspersky Lab Identifies Operation ‘Red October,” an Advanced Cyber-Espionage Campaign Targeting Diplomatic and Government Institutions Worldwide
. Kaspersky Lab, 2013.
Red October Analysis Reveals Complex, Two-Stage Attack
. InfoSecurity, 2013.
Raywood, Dan
.
"
Red October Espionage Campaign Targets Governments and Organisations
."
SC Magazine
(2013).
Gilmore, Gerry J.
.
DOD, Industry Address ‘Intense Challenge’ of Cyber Security
. US Department of Defence, 2011.
Schuurman, Marriët
.
"
NATO and the Women, Peace and Security Agenda: Time to Bring It Home
."
Connections: The Quarterly Journal
14, no. 3 (2015): 1-6.
Arostegui, J.D. Julie L.
.
"
Gender and the Security Sector: Towards a More Secure Future
."
Connections: The Quarterly Journal
14, no. 3 (2015): 7-30.
Holvikivi, Aiko
.
"
What Role for the Security Sector? An SSR Approach to Implementing the Women, Peace and Security Agenda
."
Connections: The Quarterly Journal
14, no. 3 (2015): 31-44.
Watson, Callum
.
"
Begging the Question: What Would a Men, Peace and Security Agenda Look Like?
"
Connections: The Quarterly Journal
14, no. 3 (2015): 45-60.
Kümmel, Gerhard
.
"
The Bundeswehr and Female Soldiers: The Integration of Women into the Armed Forces (2000–2015)
."
Connections: The Quarterly Journal
14, no. 3 (2015): 61-86.
Tomić, Ankica
.
"
Gender Mainstreaming of the Security Sector in Bosnia and Herzegovina: From the Policy Papers to Reality
."
Connections: The Quarterly Journal
14, no. 3 (2015): 87-102.
Lackenbauer, Helené
, and
Richard Langlais
.
Review of the Practical Implications of UNSCR 1325 for the Conduct of NATO-led Operations and Missions
. Stockholm: Swedish Defense Research Agency (FOI), 2013.
Wales Summit Declaration
., 2014.
Address at the Georgetown Institute for Women, Peace and Security
. Washington, D.C., 2014.
Bastick, Megan
, and
Tobie Whitman
.
A Women’s Guide to Security Sector Reform
. Washington, D.C.: The Institute for Inclusive Security and DCAF, 2013.
Bichetero, Veron¬ica Eragu
.
Women, Peace and Security: Practical Guidance on Using Law to Empower Women in Post-Conflict Systems
. Washington, D.C.: Women in International Security, 2014.
Department of Defense Implementation Guide for the U.S. National Action Plan on Women, Peace, and Security
., 2013.
Oudraat, Chantal de Jonge
.
"
UNSCR 1325 – Conundrums and Opportunities
."
International Interactions
39 (2013): 615-616.
Gun Homicide and Violent Crime
. Pew Research Center’s Social and Demographic Trends, 2015.
Quast, Shelby
.
"
Justice Reform and Gender
." In
Gender and Security Sector Reform Toolkit
, 8. Geneva: DCAF, OSCE/ODIHR, UN-INSTRAW, 2008.
Garcia-Morena, Claudia
.
Multi-Country Study on Women’s Health and Domestic Violence Against Women
. Geneva: World Health Organization, 2005.
Violence Against Women: Intimate Partner and Sexual Violence Against Women
. World Health Organization, 2014.
Pages
« първа
‹ предишна
…
114
115
116
117
118
119
120
121
122
…
следваща ›
последна »
380983 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance