Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Justice, The U. S. Departm
.
The Sabotage Handbook
., 2001.
G., Weimann
.
"
Virtual Terrorism: How Modern Terrorism Uses the Internet
."
Journal of International Security Affairs
(2007).
I., Kershner
.
"
Cyber attack exposes 20,000 Israeli credit card numbers and details about users
."
New York Times
.
von Bertalanffy, Ludwig
.
General System Theory: Foundation, Development, Applications
. New York: George Braziller, 1968.
Vester, Frederic
.
The Art of Interconnected Thinking – Ideas and Tools for Dealing with Complexity
. München: MCB-Verlag, 2007.
D: Information and Communication Security 12
In
NATO Science for Peace Security Series
. Amsterdam: IOS Press, 2007.
Chen, Peter
.
"
The Entity-Relationship Model-Toward a Unified View of Data
."
ACM Transactions on Database Systems
1, no. 1 (1976): 9-36.
Advanced Cyber Defence Centre Home Page
., 2015.
Minchev, Zlatogor
.
Security Foundations in Cyber Space, Training Course Selected Materials
., 2015.
Hadnagy, Christopher
.
Unmasking the Social Engineering. The Human Element of Security
. John Wiley & Sons, Inc., 2014.
Minchev, Z.
,
E. Kelevedjiev
, and
P. Gatev
.
Audio-Visual Entrainment Influence on Postural Dynamics
In
Proceedings of International Workshop ‘Posture, Balance and the Brain’
. Thessaloniki, Greece, 2015.
Turoff, Murray
, and
Harold Linstone
.
The Delphi Method: Techniques and Applications
., 2002.
Cyber Glossary
In
National Initiative for Cybersecurity Careers and Studies
., 2014.
Commission, European
.
Europe’s Future Security Challenges
., 2014.
Lewis, James A.
, and
Katrina Timlin
.
Cybersecurity and Cyberwarfare Preliminary Assessment of National Doctrine and Organization
. Washington, D.C.: Center for strategic and international studies, 2011.
Pepi, Stephanie
.
USAID launches the Albanian Cyber-Security Program
., 2011.
Kosovo police web site
., 2015.
NATO SPS
., 2015.
First SEENSA Thematic Work Group (TWG) Meeting on Cyber Defence
. Belgrade: Directorate for Security of Classified Information of the Republic of Macedonia , 2014.
Government of the Republic of Macedonia
.
Strategy and action plan on informatics society of the Republic of Macedonia
., 2005.
Online news portal announcement
., 2015.
Centre, Belgrade University
.
Web announcement
., 2015.
OECD
.
Cybersecurity policy making at a turning point, Analysing a new generation of national cybersecurity strategies for the Internet economy
., 2012.
The Comprehensive study on cybercrime 2013
. United Nations Office of drugs and crimes, 2013.
Grande, Allison
.
Data Breaches Put Retail GCs in the Firing Line
. New York: Law360, 2014.
Pages
« първа
‹ предишна
…
176
177
178
179
180
181
182
183
184
…
следваща ›
последна »
379475 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance