Премини към основното съдържание
ИТ в сигурността
Екип
Изследователи
Сътрудници
Специалисти
Докторанти
Проекти
Текущи
Предстоящи
Завършени
Курсове
Отбранителна политика
Изследвания на сигурността
Киберсигурност
Администрация
Мениджмънт
Икономика
Иновации
Теми
виж всички
Ресурси
Публикации
Доклади
Позиции на ЦМСО
Презентации
Книги
Събития
Партньори
Контакти
Biblio
Export 8062 results:
RTF
EndNote XML
2013
Stepan, Alfred
, and
Juan J. Linz
.
"
Democratization Theory and the Arab Spring
."
Journal of De-mocracy
24, no. 2 (2013): 29.
Google Scholar
RTF
EndNote XML
J. Cole, Michael
.
"
The DF-21D or ‘Carrier Killer’: An Instrument of Deception?
"
The Diplomat
(2013).
Google Scholar
RTF
EndNote XML
Mazarr, Michael J.
.
Discriminate Power: A Strategy for a Sustainable National Security Posture
In
The Philadelphia Papers
. NDU Strategy Study Group, 2013.
Google Scholar
RTF
EndNote XML
Jimbo, Ken
.
Dynamics of Power Shift from U.S. to China – Asia-Pacific Security and Japan’s Foreign Policy
. Japan Foreign Policy Forum, 2013.
Google Scholar
RTF
EndNote XML
Lavoie, Denise
, and
Tom Hays
.
Dzhokhar Tsarnaev, Boston Bombing Suspect, Was Influenced By Internet: Indictment
. The Huffington Post, 2013.
Google Scholar
RTF
EndNote XML
Zagorski, Andrei
.
Economic Cooperation in the Post Soviet Space
. Geneva Centre for Security Policy, 2013.
Google Scholar
RTF
EndNote XML
Omand, Davis
.
"
Edward Snowden’s leaks are misguided – they risk exposing us to cyber-attacks
."
Guardian
(2013).
Google Scholar
RTF
EndNote XML
Shabaneh, Ghassan
.
Egypt and Syria’s Effect on the Israeli-Palestinian Conflict
. Qatar: Al-Jazeera Center for Studies, 2013.
Google Scholar
RTF
EndNote XML
el-Senawi, Abdallah
.
Egypt’s Big ‘what if’? Sisi and his Possible Rise to Power
. Al Arabyia Institute for Studies, 2013.
Google Scholar
RTF
EndNote XML
Dettmer, Jamie
.
Egypt’s Military: Sinai Jihadist Attacks on the Decline
. Voice of America, 2013.
Google Scholar
RTF
EndNote XML
Missiroli, Antonio
.
Enabling the Future: EU Military Capability 2013-2025
. Paris: EU Institute for Security Studies, 2013.
Google Scholar
RTF
EndNote XML
Missiroli, Antonio
.
Enabling the Future European Military Capabilities 2013–2025: Challenges and Avenues
. Paris: EU Institute for Security Studies, 2013.
Google Scholar
RTF
EndNote XML
Barroso, Jose Manuel
.
Energy Challenges and Policy
In
European Commission Report to the European Council
., 2013.
Google Scholar
RTF
EndNote XML
Luft, Gal
.
The Energy-Security Paradox
. The National Interest, 2013.
Google Scholar
RTF
EndNote XML
Metais, Raphael
.
Ensuring Energy Security in Europe: The EU between a Market-based and a Geopolitical Approach
In
EU Diplomacy Paper
. College of Europe, 2013.
Google Scholar
RTF
EndNote XML
each, Gary Р.
.
"
Estonia’s Shale Oil Market: How The Small Country Is Hoping To Revolutionize The Energy Sector
."
Huffington Post
(2013).
Google Scholar
RTF
EndNote XML
ECHR, European
.
European Convention on Human Rights, as amended by Priotocols Nos. 11 and 14, supplemented by Protocols Nos. 1, 4, 6, 7, 12 and 13
. Strasbourg: European Court of Human Rights, Council of Europe, 2013.
Google Scholar
RTF
EndNote XML
Shahraiyni, Hamid Taheri
,
Mohammad Reza Gafourhi
,
Bahram Saghafi An
, and
Saeed Bagheri Shouraki
.
"
Evaluation of a novel fuzzy method and a conceptual model for a long-term daily streamflow simulation
."
River Systems
20, no. 3-4 (2013).
Google Scholar
RTF
EndNote XML
Shuster, Simon
.
"
Exclusive: Dagestani Relative of Tamerlan Tsarnaev Is a Prominent Islamist
."
Time Magazine
(2013).
Google Scholar
RTF
EndNote XML
Ball, James
,
Julian Borger
, and
Glenn Greenwald
.
"
Exclusive: how US and Britain unlock privacy on the internet
."
Guardian
(2013): 1, 4-5.
Google Scholar
RTF
EndNote XML
Klaidman, Daniel
.
Exclusive: The Awlaki/Tsarnaev Connection
. The Daily Beast, 2013.
Google Scholar
RTF
EndNote XML
Exposing One of China’s Cyber Espionage Units
. Mandiant APT 1, 2013.
Google Scholar
RTF
EndNote XML
Rossi, Michael
.
Five Inconvenient Truths about Kosovo
., 2013.
Google Scholar
RTF
EndNote XML
Lewis, James
.
"
Five Myths about Chinese Hackers
."
Washington Post
(2013).
Google Scholar
RTF
EndNote XML
Nikolova, Mariyana
,
Stoyan Nedkov
, and
Valentin Nikolov
.
"
Flood Hazard in Bulgaria: Case Study of Etropolska Stara Planina
."
Geomorphological impacts of extreme weather
(2013): Springer Netherlands.
Google Scholar
RTF
EndNote XML
Страници
« първа
‹ предишна
…
4
5
6
7
8
9
10
11
12
…
следваща ›
последна »
English
Български
Форма за търсене
Търси
Resources
Политика за сигурност
Киберсигурност
Разузнаване
Вътрешен ред и сигурност
Terrorism
Операции
Технологии и индустрия
Управление на човешките ресурси
Управление на аквизицията
Стратегия
Концепции и доктрини
Мениджмънт
Икономика на отбраната
Финансов мениджмънт
Мениджмът на информация и знание
Симулации и подготовка
Управление на промяната
Взимане на решение
Добро управление