Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 12 results:
RTF
EndNote XML
Filters:
Author
is
ENISA
[Clear All Filters]
2021
ENISA
.
CSIRT Maturity - Self-assessment Tool
(link is external)
., 2021.
Google Scholar
(link is external)
RTF
EndNote XML
ENISA
.
NCSS: Practical Guide on Development and Execution
(link is external)
., 2021.
Google Scholar
(link is external)
RTF
EndNote XML
2020
ENISA
.
CSIRT Maturity – Self-assessment Tool
(link is external)
., 2020.
Google Scholar
(link is external)
RTF
EndNote XML
ENISA
.
Guidelines for Securing the Internet of Things
(link is external)
., 2020.
Google Scholar
(link is external)
RTF
EndNote XML
2017
ENISA
.
Public Private Partnerships (PPP) – Cooperative Models
., 2017.
DOI
(link is external)
Google Scholar
(link is external)
RTF
EndNote XML
ENISA
.
Threat-Landscape-Report 2017
. Heraklion: European Union Agency for Network and Information Security, 2017.
Google Scholar
(link is external)
RTF
EndNote XML
2015
ENISA
.
National Cyber Security Strategies in the World
(link is external)
., 2015.
Google Scholar
(link is external)
RTF
EndNote XML
2014
ENISA
.
ENISA Threat Landscape 2014: Overview of current and emerging cyber-threats
., 2014.
Google Scholar
(link is external)
RTF
EndNote XML
2013
ENISA
.
Position Paper of the EP3R Task Forces on Trusted Information Sharing (TF-TIS)
. European Union Agency for Network and Information Security, 2013.
Google Scholar
(link is external)
RTF
EndNote XML
2012
ENISA
.
Proactive Detection of Security Incidents - Honeypots
., 2012.
Google Scholar
(link is external)
RTF
EndNote XML
2011
ENISA
.
Critical Infrastructures and Services: Maritime
(link is external)
., 2011.
Google Scholar
(link is external)
RTF
EndNote XML
2009
ENISA
.
Good Practice Guide – Network Security Information Exchanges
., 2009.
Google Scholar
(link is external)
RTF
EndNote XML
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance
Back to top