Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
SysSec Network of Excellence Home Page
., 2015.
Balzarotti, Davide
, and
Evangelos Markatos
.
The Red Book – A Roadmap for Systems Security Research
. SysSec Consortium, 2013.
Cybersecurity in 2015: What to expect?
In
2015 Global Megatrends in Cybersecurity
. ZDNET, 2014.
Thompson, K. K.
.
"
Not Like an Egyptian: Cybersecurity and the Internet Kill Switch Debate
." In
Texas Law Review
, 465-495. Vol. 90., 2011.
House, White
.
Securing Cyberspace – President Obama Announces New Cybersecurity Legislative Proposal and Other Cybersecurity Efforts
In
The White House
., 2015.
Newmeyer, K.
.
Cybersecurity and the 2015 State of the Union Address. Cyber Experts Blog at National Cybersecurity Institute
., 2015.
Newmeyer, K.
.
Cybersecurity in the President’s National Security Strategy. Cyber Experts Blog at National Cybersecurity Institute
., 2015.
Sylvertooth, R.
.
Government Cyber Agency Will Be Here Shortly! Cyber Experts Blog at National Cybersecurity Institute
., 2015.
Hudson, D.
.
President Obama Speaks at the White House Summit on Cybersecurity and Consumer Protection. The White House Blog.
., 2015.
Newmeyer, K.
.
Executive Order on Cybersecurity: Billion-Dollar Bank Heist. Cyber Experts Blog at National Cybersecurity Institute
., 2015.
Office, Department for Educat
.
How social media is used to encourage travel to Syria and Iraq briefing note for school
., 2015.
B., Jenkins
.
International Terrorism
. Los Angeles, 1975.
A.P., Schmid
.
Radicalisation, De-Radicalisation, Counter-Radicalisation: A Conceptual Discussion and Literature Review
. Hague: International Centre for Counter-Terrorism Research Paper, 2003.
Ashour, O.
.
The De-Radicalization of Jihadists: Transforming armed Islamist movements, Routledge
. London, 2009.
J., Sinai
.
"
Radicalization into Extremism and Terrorism
."
Intelligencer: Journal of U.S. Intelligence Studies
19, no. 2 (2012).
A.P., Schmid
.
Glossary and Abbreviations of Terms and Concepts Relating to Terrorism and Counter-Terrorism
. London: Routledge, 2011.
G., Weimann
.
The Internet as a Terrorist Tool to Recruit Youth
. Arlington: Youth Recruitment & Radicalization Roundtable, 2009.
London, King’s College
.
Recruitment and Mobilization for the Islamist Militant Movement in Europe
. London: King’s College, 2007.
A., Kaczynski
.
8 Ways Terrorists Use the Internet for Recruitment
., 2014.
J.M., Berger
.
How ISIS Games Twitter
., 2014.
The Terrorist’s Handbook
., 2005.
Powell, William
.
The Anarchist Cookbook
. Barricade Books, 2002.
Aziz, Abdel –
.
The Mujahideen Poisons Handbook
., 2004.
,
Stephen R.B.
, and
Valeria C.
.
"
The Encyclopedia of Jihad
." Faculty Publications and Presentations, Liberty University, 2001.
M., Alexei
,
Stephen R.B.
, and
Valeria C.
.
"
The Encyclopedia of Jihad
." Faculty Publications and Presentations, Liberty University, 2001.
Pages
« първа
‹ предишна
…
175
176
177
178
179
180
181
182
183
…
следваща ›
последна »
388794 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance