Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Le Beau, John J.
.
"
Foreword
." In
The Dangerous Landscape
., 2013.
Arasli, Jahangir E.
.
"
Violent Converts to Islam: Growing Cluster and Rising Trend
." In
The Dangerous Landscape
, 99-121., 2013.
Dengg, Anton
.
"
Challenges of Intelligence Sharing in Combating Terrorism: An Academic Point of View
." In
The Dangerous Landscape
, 123-132., 2013.
Busuncian, Tatiana
.
"
International Intelligence Cooperation against Terrorist Targets – Phase II
." In
The Dangerous Landscape
, 133-151., 2013.
Sick, Armin
.
"
Understanding Homegrown Terrorism
." In
The Dangerous Landscape
, 153-170., 2013.
Sarkisyan, Sergei
.
"
Aspects of Recruitment by Terrorist Organizations in Europe’s Muslim Communities
." In
The Dangerous Landscape
, 171-189., 2013.
Azinovic, Vlado
.
"
Bosnia and Herzegovina and Terrorism 1996-2011: Defining the Threat, Devising Counterterrorism Strategy
." In
The Dangerous Landscape
, 191-209., 2013.
Schmid, Alex P.
.
"
International Terrorism and International Tourism
." In
The Dangerous Landscape
, 211-219., 2013.
Le Beau, John J.
.
"
The Death of bin Laden, and the Future of Al-Qaeda
." In
The Dangerous Landscape
, 221-222., 2013.
Tichý, Lukáš
, and
Jan Eichler
.
"
Terrorist Attacks on the Energy Sector: The Case of Al Qaeda and the Islamic State
."
Studies in Conflict & Terrorism
(2017).
Tagarev, Todor
.
"
A Generic Reference Curriculum on Cybersecurity
."
Information & Security: An International Journal
35, no. 2 (2016): 181-184.
Sadiku, Matthew N. O.
,
Shumon Alam
, and
Sarhan M. Musa
.
"
Information Assurance Benefits and Challenges: An Introduction
."
Information & Security: An International Journal
36 (2017).
Wilson, Kelce S.
.
"
Conflicts among the Pillars of Information Assurance
."
IT Professional
15, no. 4 (2013): 44-49.
Ezingeard, Jean-Noël
,
Elspeth McFadzean
, and
David Birchall
.
"
A Model of Information Assurance Benefits
."
Information Systems Management
22, no. 2 (2005): 22-29.
Lester, Cynthia Y.
,
Hira Narang
, and
Chung-Han Chen
.
Infusing Information Assurance into an Undergraduate CS Curriculum
In
Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies SECUR¬WARE'08
. Cap Esterel, France, 2008.
Cooper, Stephen
,
Christine Nickell
,
Victor Piotrowski
,
Brenda Oldfield
,
Bill Caelli
, and
Lance Hoffman
.
"
An Exploration of the Current State of Information Assurance Education
."
ACM SIGCSE Bulletin
41, no. 4 (2009): 109-125.
Cannoy, Sherrie Drye
, and
A. F. Salam
.
"
A Framework for Health Care Information Assurance Policy and Compliance
."
Communications of the ACM
53, no. 3 (2010): 126-131.
Deb, Budhaditya
,
Sudeept Bhatnagar
, and
Badri Nath
.
Information Assurance in Sensor Networks
In
2nd ACM International Conference on Wireless Sensor Networks and Applications WSNA’03
. San Diego, CA, 2003.
NATO C4ISR Comprehensive Approach
In
NATO C3 Board and NC3A
. Brussels, 2009.
COBIT 5: A Business Framework for the Governance and Management of Enterprise IT
., 2017.
Persse, James R.
.
Process Improvement Essentials: CMMI, Six Sigma, and ISO 9001
. Sebastopol, CA: O’Reilly Media, 2006.
Doz, Yves L.
, and
Mikko Kosonen
.
Fast Strategy: How Strategic Agility Will Help You Stay Ahead of the Game
. Harlow, England: Wharton School Publishing, 2008.
Collins, Jim
, and
Morten T. Hansen
.
Great by Choice: Uncertainty, Chaos, and Luck – Why Some Thrive Despite Them All
. New York, NY: HarperCollins, 2011.
Hiatt, Jeffrey M.
.
ADKAR: A Model for Change in Business, Government and our Community
. Loveland, CO: Prosci Inc., 2006.
Carroll, John
.
Project Program and Portfolio Management in Easy Steps
. Warwickshire, UK: Easy Steps Limited, 2014.
Pages
« първа
‹ предишна
…
213
214
215
216
217
218
219
220
221
…
следваща ›
последна »
374743 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance