Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21423 results:
RTF
EndNote XML
Filters:
Filter
is
[Clear All Filters]
2015
IOM: Latest Data on Europe Migrant Emergency
(link is external)
. International Organization for Migration, 2015.
Google Scholar
(link is external)
RTF
EndNote XML
Paul, Amanda
.
Iran's policy in the South Caucacus Between pragmatism and realpolitik, in The South Caucasus: Between integration and fragmentation
. European Policy Centre – SAM, 2015.
Google Scholar
(link is external)
RTF
EndNote XML
Doran, Jamie
, and
Najibullah Quraishi
.
ISIL and the Taliban
(link is external)
. Al-Jazeera, 2015.
Google Scholar
(link is external)
RTF
EndNote XML
"
Isis Advertises 10 Jobs in the ‘Caliphate’ Including Press Officers, Bomb Makers and Teachers
(link is external)
."
The Independent
(2015).
Google Scholar
(link is external)
RTF
EndNote XML
McCants, William
.
The ISIS Apocalypse: The History, Strategy, and Doomsday Vision of the Islamic State
. Washington, DC: Brookings, 2015.
Google Scholar
(link is external)
RTF
EndNote XML
Solomon, Erika
,
Guy Chazan
, and
Sam Jones
.
"
ISIS Inc.: How Oil Fuels the Jihadi Terrorists
(link is external)
."
Financial Times
(2015).
Google Scholar
(link is external)
RTF
EndNote XML
Weiss, Michael
, and
Hassan Hassan
.
ISIS. Inside the Army of Terror
. New York: Regan Arts, 2015.
Google Scholar
(link is external)
RTF
EndNote XML
Weiss, Michael
, and
Hassan Hassan
.
ISIS: Inside the Army of Terror
. New York: Simon & Schuster, 2015.
Google Scholar
(link is external)
RTF
EndNote XML
Cronin, Audrey Kurth
.
"
ISIS Is Not a Terrorist Group: Why Counterterrorism Won’t Stop the Latest Jihadist Threat
(link is external)
."
Foreign Affairs
(2015).
Google Scholar
(link is external)
RTF
EndNote XML
Gilsinan, Kathy
.
Is ISIS’s Social-Media Power Exaggerated?
(link is external)
. The Atlantic, 2015.
Google Scholar
(link is external)
RTF
EndNote XML
Stern, Jessica
, and
J.M. Berger
.
ISIS: The State of Terror
. New York: HarperCollins, 2015.
Google Scholar
(link is external)
RTF
EndNote XML
Meir Amit Intelligence and Terrorism Information Center
.
ISIS Updates Security Tips to Operatives Traveling to Syria
(link is external)
. American Center for Democracy, 2015.
Google Scholar
(link is external)
RTF
EndNote XML
Brown, Bill
.
Isla Vista Mass Murder, May 23, 2014, Investigative Summary
In
18 February 2015
. Santa Barbara, CA: Santa Barbara County Sheriff’s Office, 2015.
Google Scholar
(link is external)
RTF
EndNote XML
Masi, Alessandria
.
"
Islamic State ‘Caliphate’ in Libya Depends on Tunisian Foreign Fighters and Desert Training Camps
(link is external)
."
International Business Times
(2015).
Google Scholar
(link is external)
RTF
EndNote XML
Borschevskaya, Anna
.
"
The Islamic State Comes to Russia
(link is external)
."
Journal of International Security Affairs
(2015): 27-32.
Google Scholar
(link is external)
RTF
EndNote XML
Islamic State threat to Russia is real – FSB
. RT, 2015.
Google Scholar
(link is external)
RTF
EndNote XML
Atwan, Abdel Bari
.
Islamic State − the Digital Caliphate
. London: Saqi Books, 2015.
Google Scholar
(link is external)
RTF
EndNote XML
Bruggeman, Willy
,
Marleen Easton
, and
Philippe De Baets
.
"
It’s the Economy’ of Hoe Financiële Imperatieven Het Politie – En Veiligheidsbeleid Meer Dan Ooit Bepalen
."
Orde van de Dag: Criminaliteit En Samenleving
71 (2015): 15-18.
Google Scholar
(link is external)
RTF
EndNote XML
Italian National Police
(link is external)
., 2015.
Google Scholar
(link is external)
RTF
EndNote XML
Buriro, Attaullah
,
Bruno Crispo
,
Filippo Del Frari
,
Jeffrey Klardie
, and
Konrad Wrona
.
"
ITSME: Multi-modal and Unobtrusive Behavioural User Authentication for Smartphones
." In
Technology and Practice of Passwords, Lecture Notes in Computer Science
, 45-61. Vol. 9551. Cham: Springer, 2015.
DOI
(link is external)
Google Scholar
(link is external)
RTF
EndNote XML
ITU Statistics
(link is external)
., 2015.
Google Scholar
(link is external)
RTF
EndNote XML
ITU-T Work Programme
(link is external)
., 2015.
Google Scholar
(link is external)
RTF
EndNote XML
Jacenjuk ne vojuvav u Chechni, istorija Bastrykina ne shodytsja – uchasnyk pershoi chechenskoi vijny
(link is external)
. Radio Svoboda, 2015.
Google Scholar
(link is external)
RTF
EndNote XML
"
Jaïr van der Lijn, Comprehensive approaches, diverse coherences: the different levels of policy coherence in the Dutch 3D approach in Afghanistan
."
Small Wars & Insurgencies
26, no. 1 (2015): 72-89.
Google Scholar
(link is external)
RTF
EndNote XML
Sparrow, Andrew
.
Jean-Claude Juncker calls for EU Army
(link is external)
. The Guardian online, 2015.
Google Scholar
(link is external)
RTF
EndNote XML
Pages
« first
‹ previous
…
205
206
207
208
209
210
211
212
213
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance
Back to top