Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21404 results:
RTF
EndNote XML
2016
Frías, Alejandro Sánchez
.
Cazador o presa en la telaraña del terror? la UE en la lucha contra el ciberterrorismo
. UNIVERSIDAD DE MÁLAGA, 2016.
Google Scholar
RTF
EndNote XML
CCNA Security
In
Cisco Networking Academy
., 2016.
Google Scholar
RTF
EndNote XML
Patnaik, Ajay
.
Central Asia: Geopolitics, security and stability
. Routledge, 2016.
Google Scholar
RTF
EndNote XML
Caralli, Richard A.
,
Julia H. Allen
,
David W. White
,
Lisa R. Young
,
Nader Mehravari
, and
Pamela D. Curtis
.
CERT Resilience Management Model. Version 1.2
In
Technical Report
. Carnegie Mellon University, 2016.
Google Scholar
RTF
EndNote XML
Certifications
In
The Cisco Learning Network
., 2016.
Google Scholar
RTF
EndNote XML
Fountain, J.K.A.
.
CH-146 Griffon Capability Replacement: Informed by the Past, Prepared for the Future?
In
JCSP 42 – PCEMI 42
. Canadian Forces College, 2016.
Google Scholar
RTF
EndNote XML
Temah, Roland A.
.
The challenges of emergency managers: Integrating lessons learned into mitigation planning
. Capella University, 2016.
Google Scholar
RTF
EndNote XML
Minchev, Zlatogor
.
"
Challenges to Human Factor for Advance Persistent Threats Proactive Identification in Modern Social Networks
."
Information & Security: An International Journal
34, no. 2 (2016): 123-136.
DOI
Google Scholar
RTF
EndNote XML
Zimmerman, Katherine
, and
Jon Diamond
.
"
Challenging the Yemeni State: ISIS in Aden and al Mukalla
."
Critical Threats
(2016).
Google Scholar
RTF
EndNote XML
Orosz, Gábor
.
"
Changing Conspiracy Beliefs through Rationality and Ridiculing
."
Frontiers in Psychology
7 (2016).
Google Scholar
RTF
EndNote XML
Banasik, Mirosław
.
"
A Changing Security Paradigm. New Roles for New Actors – The Russian Approach
."
Connections: The Quarterly Journal
15, no. 4 (2016): 31-43.
DOI
Google Scholar
RTF
EndNote XML
Stroup, Anthony
.
Chief, Nuclear, CBRN Defence and Arms Control Policy Branch
In
interviewed by the author
. NATO International Military Staff, 2016.
Google Scholar
RTF
EndNote XML
Otuko, Apio Eunice
.
Children born of war in northern Uganda: kinship, marriage, and the politics of post-conflict reintegration in Lango society
. Vol. Thesis submitted to the University of Birmingham for the degree of DOCTOR OF PHILOSOPHY. University of Birmingham, 2016.
Google Scholar
RTF
EndNote XML
Kennedy, William
.
China and the evolution of power: What is motivating China to adopt soft power strategies and how effective have these strategies been?
In
Political Science: International Relations
. Vol. Master Thesis. Universiteit van Amsterdam, 2016.
Google Scholar
RTF
EndNote XML
Lewis, Nathan
.
"
China Is Laying The Foundation For The Next World Gold Standard System
."
Forbes
(2016).
Google Scholar
RTF
EndNote XML
Republic, National Statistica
.
Chislennost naseleniya Kirgizskoi Respubliki za 1 Janvarya 2016 goda (Population of the Kyrgyz Republic for 1 January 2016)
., 2016.
Google Scholar
RTF
EndNote XML
Cisco CCNA Introduction to Networks course
. Cisco Networking Academy, 2016.
Google Scholar
RTF
EndNote XML
Cisco Networking Academy
., 2016.
Google Scholar
RTF
EndNote XML
Civil Protection Directorate of Zimbabwe
. Government of Zimbabwe, 2016.
Google Scholar
RTF
EndNote XML
Olbrich, Christian
.
A Close Look at Ransomware by the Example of Vipasana
., 2016.
Google Scholar
RTF
EndNote XML
Durugbo, C.
.
"
Collaborative Networks: A Systematic Review and Multi-level Framework
."
International Journal of Production Research
54, no. 12 (2016): 3749-3776.
DOI
Google Scholar
RTF
EndNote XML
Manaf, A.A.
,
Ali Boroujerdizade
, and
Seyed Mojtaba Mousavi
.
"
Collusion-Resistant digital video watermarking for copyright protection application
."
International Journal of Applied Engineering Research
11, no. 5 (2016): 3484-3495.
Google Scholar
RTF
EndNote XML
Correia, Pedro Miguel Alv
, and
Inês Oliveira A. de Jesus
.
"
Combate às transferências bancárias ilegítimas pela Internet no direito português: entre as experiências domésticas e políticas globais concertadas
."
Revista Direito GV
12, no. 2 (2016).
Google Scholar
RTF
EndNote XML
Jelovčić, Petra Amižić
, and
Dragan Bolanča
.
"
Combating Maritime Terrorism under the International Law and European Law
."
Scientific Cooperations International Journal of Law and Politics
2, no. 1 (2016).
Google Scholar
RTF
EndNote XML
Wither, James
, and
Sam Mullins
.
Combating Transnational Terrorism
. Sofia: Procon Ltd., 2016.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
148
149
150
151
152
153
154
155
156
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance