Премини към основното съдържание
ИТ в сигурността
Екип
Изследователи
Сътрудници
Специалисти
Докторанти
Проекти
Текущи
Предстоящи
Завършени
Курсове
Отбранителна политика
Изследвания на сигурността
Киберсигурност
Администрация
Мениджмънт
Икономика
Иновации
Теми
виж всички
Ресурси
Публикации
Доклади
Позиции на ЦМСО
Презентации
Книги
Събития
Партньори
Контакти
Biblio
Export 8062 results:
RTF
EndNote XML
2012
Malhotra, A.
.
Chinese Inroads into Central Asia: Focus on Oil and Gas
. Journal of Energy Security, 2012.
Google Scholar
RTF
EndNote XML
CIA World Factbook - Armenia
., 2012.
Google Scholar
RTF
EndNote XML
Procházková, Dana
.
"
Civil protection
." In
International Conference on “Global Existential Risks” (Globálne existenciálne riziká)
. Žilina, 2012.
Google Scholar
RTF
EndNote XML
Appelrouth, Scott A.
, and
Laura Desfor Edles
.
Classical and Contemporary Theory
. 2nd Edition ed. Thousand Oaks, CA: Pine Forge Press, 2012.
Google Scholar
RTF
EndNote XML
Williamson, Wade
.
Combating Emerging Threats Through Security Collaboration
. Security Week, 2012.
Google Scholar
RTF
EndNote XML
López, David
,
Oscar Pastor
, and
Luis Javier García
.
"
Comunicación de Eventos de Seguridad orientada al Análisis de Riesgos Dinámico
." In
XII Spanish Meeting on Cryptology and Information Security (RECSI),
. San Sebastián, 2012.
Google Scholar
RTF
EndNote XML
López, David
,
Oscar Pastor
, and
Luis Javier García
.
"
Concepto y Enfoques sobre el Análisis y la Gestión Dinámica del Riesgo en Sistemas de Información
." In
XII Spanish Meeting on Cryptology and Information Security (RECSI)
. San Sebastián, 2012.
Google Scholar
RTF
EndNote XML
Fernández, Diego
,
Oscar Pastor
,
Sarah Brown
,
Emily Reid
, and
Christopher Spirito
.
"
Conceptual Framework for Cyber Defense Information Sharing within Trust Relationships
." In
Proceedings of the Fourth International Conference on Cyber Conflict (CYCON)
, 429-445. Tallinn: NATO CCD COE Publications, 2012.
Google Scholar
RTF
EndNote XML
Sanger, David
.
Confront and Conceal: Obama’s Secret Wars and Surprising Use of American Power
. New York: Crown Publishers, 2012.
Google Scholar
RTF
EndNote XML
Consolidated Report
. Organization for Security and Cooperation in Europe, Forum for Security Co-operation, 2012.
Google Scholar
RTF
EndNote XML
CSTO to Work at Building Collective Air Defense System in CA
. Kazinform, 2012.
Google Scholar
RTF
EndNote XML
Cultural Awareness Afghanistan Course
. British Army ADL, 2012.
Google Scholar
RTF
EndNote XML
Ferran, Lee
, and
Rhonda Schwartz
.
"
Cyber Spy Program Flame Compromises Key Microsoft Security System
."
ABC News
(2012).
Google Scholar
RTF
EndNote XML
Aitel, Dave
.
"
The Cybersecurity Act of 2012: Are We Smarter Than a Fifth Grader?
"
Huff Post Tech
(2012).
Google Scholar
RTF
EndNote XML
"
Cyberwar. War in the fifth domain
."
The Economist
(2012).
Google Scholar
RTF
EndNote XML
Dzutsev, Valery
.
"
Dagestan’s President Promises a Decisive Crackdown on the Insurgency
."
Eurasia Daily Monitor
9, no. 70 (2012).
Google Scholar
RTF
EndNote XML
Walt, Stephen M.
.
"
Dealing With a Chinese Monroe Doctrine
."
The New York Times
(2012).
Google Scholar
RTF
EndNote XML
Iordan, Cristian
.
"
Defending Europe
."
Per Concordiam
3, no. 2 (2012): 46-53.
Google Scholar
RTF
EndNote XML
Carothers, Thomas
.
Democracy Policy Under Obama: Revitalization or Retreat?
. Washington, D.C.: Carnegie Endowment for International Peace, 2012.
Google Scholar
RTF
EndNote XML
"
Dependable Systems, Services & Technologies
." In
DESSERT 2012
. Sevastopol, Ukraine, 2012.
Google Scholar
RTF
EndNote XML
Deterrence and Defense Posture Review
. Chicago: 2012 NATO Summit, 2012.
Google Scholar
RTF
EndNote XML
Johnson, Andrew
.
"
Don’t Work with This Dictatorship, London Metropolitan University Told
."
Islington Tribune
(2012).
Google Scholar
RTF
EndNote XML
Doubts over Real Target of Uzbek ‘terror’ Blast
. Bishkek: Times of Central Asia, 2012.
Google Scholar
RTF
EndNote XML
Tarand, Indrek
.
Draft report by MEP
. MEP, 2012.
Google Scholar
RTF
EndNote XML
Eastern Partnership: A Roadmap to the Autumn 2013 Summit
. European Commission, 2012.
Google Scholar
RTF
EndNote XML
Страници
« първа
‹ предишна
…
15
16
17
18
19
20
21
22
23
…
следваща ›
последна »
English
Български
Форма за търсене
Търси
Resources
Политика за сигурност
Киберсигурност
Разузнаване
Вътрешен ред и сигурност
Terrorism
Операции
Технологии и индустрия
Управление на човешките ресурси
Управление на аквизицията
Стратегия
Концепции и доктрини
Мениджмънт
Икономика на отбраната
Финансов мениджмънт
Мениджмът на информация и знание
Симулации и подготовка
Управление на промяната
Взимане на решение
Добро управление