Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21423 results:
RTF
EndNote XML
Filters:
Filter
is
[Clear All Filters]
2009
Hillary Clinton’s initiative “Civil Society 2.0”
(link is external)
., 2009.
Google Scholar
(link is external)
RTF
EndNote XML
Mistdaq, Nabi
.
"
Historic Perspective on Afghanistan, its People and Culture
(link is external)
." Rayburn House Office Building, Washington D.C., 2009.
Google Scholar
(link is external)
RTF
EndNote XML
Broder, John M.
.
"
House Bill for a Carbon Tax to Cut Emissions Faces a Steep Climb
(link is external)
."
New York Times
(2009).
Google Scholar
(link is external)
RTF
EndNote XML
"
How Close Are We to Real Nanotechnology?
(link is external)
"
Humanity
(2009).
Google Scholar
(link is external)
RTF
EndNote XML
Hronologija Reforme Sektora Bezbednosti u Republici Srbiji 2000–2008
. Beograd: Centar za civilno-vojne odnose, 2009.
Google Scholar
(link is external)
RTF
EndNote XML
Kraemer, Sara
,
Pascale Carayon
, and
John Clem
.
"
Human and Organizational Factors in Computer and Information Security: Pathways to Vulnerabilities
."
Computers and Security
28 (2009): 509-520.
DOI
(link is external)
Google Scholar
(link is external)
RTF
EndNote XML
Human Security in Theory and Practice: Application of the Human Security Concept and the United Nations Trust Fund for Human Security
. United Nations Trust Fund for Human Security, 2009.
Google Scholar
(link is external)
RTF
EndNote XML
Aronowitz, Alexis A.
.
Human Trafficking, Human Misery: The Global Trade in Human Beings
. Greenwood Publishing Group, 2009.
Google Scholar
(link is external)
RTF
EndNote XML
Hoffman, Frank
.
"
Hybrid Threats: Reconceptualizing the Evolving Character of Modern Conflict
(link is external)
."
Institute for National Strategic Studies Nation al Defense University
240 (2009).
Google Scholar
(link is external)
RTF
EndNote XML
Hoffman, Frank G.
.
"
Hybrid vs. compound war. The Janus choice: Defining today’s multifaceted conflict
(link is external)
."
Armed Forces Journal
(2009).
Google Scholar
(link is external)
RTF
EndNote XML
Hoffman, Frank G.
.
"
Hybrid Warfare and Challenges
."
Joint Force Quarterly
(2009).
Google Scholar
(link is external)
RTF
EndNote XML
Hoffn, Frankma G.
.
"
Hybrid Warfare and Challenges
."
Joint Force Quarterly
52 (2009): 34-48.
Google Scholar
(link is external)
RTF
EndNote XML
Hoffman, Frank G.
.
"
Hybrid Warfare and Challenges
."
Joint Force Quarterly
52 (2009).
Google Scholar
(link is external)
RTF
EndNote XML
Wilkie, Robert
.
"
Hybrid Warfare: Something Old, Not Something New
."
Air and Space Power Journal
23, no. 4 (2009): 13-18.
Google Scholar
(link is external)
RTF
EndNote XML
Korzhubayev, Andrey
.
"
Hydrocarbon Arteries of Russia
(link is external)
."
Oil of Russia
(2009): 2.
Google Scholar
(link is external)
RTF
EndNote XML
Hegghammer, Thomas
.
"
The Ideological Hybridization of Jihadi Groups
."
Current Trends in Islamist ideology
7 (2009): 26-44.
Google Scholar
(link is external)
RTF
EndNote XML
Kilcullen, David
.
"
If we lose hearts and minds, we will lose the war
(link is external)
."
The Spectator
(2009).
Google Scholar
(link is external)
RTF
EndNote XML
Coticchia, Fabrizio
.
Il Lungo Sentiero sul Lago di Ghiaccio: L’Evoluzione della Politica di Difesa Italiana dalla Fine della Guerra Fredda all ”Operazione Leonte”
In
’Political Systems and Institutional Change’ XXI Cycle
. Vol. PhD Program . Lucca : IMT Institute for Advanced Studies, 2009.
Google Scholar
(link is external)
RTF
EndNote XML
Mingfang, Jiang
, and
Zhu Ningbo
.
"
Image fragile watermarking algorithm based on BTC domain (基于 BTC 域的图像脆弱水印算法)
."
Science and Technology and Engineering
3 (2009).
Google Scholar
(link is external)
RTF
EndNote XML
Dede, Chris
.
"
Immersive Interfaces for Engagement and Learning
(link is external)
."
Science
323 (2009): 66-9.
DOI
(link is external)
Google Scholar
(link is external)
RTF
EndNote XML
Shaw, R
,
S Charlie
,
Chen C Albert
,
L Harris
, and
Hui-Jou Huang
.
"
The Impact of Information Richness on Information Security Awareness Training Effectiveness
."
Computer & Education
52 (2009): 182-195.
Google Scholar
(link is external)
RTF
EndNote XML
Totev, Dobromir
.
"
Implementation of Results-Oriented Defense Resource Management in the Bulgarian MoD – Problems and Way Ahead
."
Information & Security: An International Journal
23, no. 1 (2009): 175-187.
DOI
(link is external)
Google Scholar
(link is external)
RTF
EndNote XML
Nikolova, M.
,
S. Nedkov
,
V. Nikolov
,
I. Zuzdrov
,
M. Genev
,
T. Kotsev
,
R. Vatseva
, and
J. Krumova
.
"
Implementation of the “KINEROS” Model for Estimation of the Flood Prone Territories in the Malki Iskar River Basin
."
Information & Security: An International Journal
24 (2009): 76-88.
DOI
(link is external)
Google Scholar
(link is external)
RTF
EndNote XML
Guo, Jing-Ming
, and
Ming-Feng Wu
.
"
Improved Block Truncation Coding Based on the Void-and-Cluster Dithering Approach
."
IEEE Transactions on Image Processing
8, no. 1 (2009).
Google Scholar
(link is external)
RTF
EndNote XML
Tagarev, Todor
.
Improving Governance in the Management of Resources in the Security and Defence Sector
In
IT4Sec Reports
. Sofia: Institute of Information and Communication Technologies, 2009.
DOI
(link is external)
Google Scholar
(link is external)
RTF
EndNote XML
Pages
« first
‹ previous
…
456
457
458
459
460
461
462
463
464
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance
Back to top