Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21404 results:
RTF
EndNote XML
2015
"
The Biological and Toxin Weapon Trends Symposium
." In
IAP Global Network of Sci-ence Academies conference
., 2015.
Google Scholar
RTF
EndNote XML
Black Sea Earthquake Safety Net(work) – ESNET
., 2015.
Google Scholar
RTF
EndNote XML
Roslycky, Lada
.
Black Sea Security Program
. Bucharest, Romania, 2015.
Google Scholar
RTF
EndNote XML
Chauvin, Justine
.
"
Book Review: Cyber War Will Not Take Place
."
Interstate - Journal of International Affairs
2015/2016, no. 2 (2015).
Google Scholar
RTF
EndNote XML
Breaking Bodies: Torture and Summary Killings in Eastern Ukraine
. Vol. 30 June 2015. London: Amnesty International, 2015.
Google Scholar
RTF
EndNote XML
"
A Brief Interview with Umm Basir Al-Muhajirah
."
Dabiq
7 (2015): 50-51.
Google Scholar
RTF
EndNote XML
Krastev, Ivan
.
Britain’s gain is Eastern Europe’s brain drain
In
Ivan Krastev’s column in The Guardian
., 2015.
Google Scholar
RTF
EndNote XML
"
British Defense Minister Says Russia’s Putin Poses ‘Danger’ to Baltic States
."
The Moscow Times
(2015).
Google Scholar
RTF
EndNote XML
"
British Spies Don Wigs and Makeup to Testify at US Trial of Al-Qaida Suspect
."
The Guardian
(2015).
Google Scholar
RTF
EndNote XML
Broken Arrows: Nuclear Weapons Accidents
. Atomic Archive.com, 2015.
Google Scholar
RTF
EndNote XML
Stronski, Paul
.
"
Broken Ukraine
."
Foreign Affairs
(2015).
Google Scholar
RTF
EndNote XML
Moodley, Kiran
.
Brusthom Ziamani’s Girlfriend: ‘He’d Mimic the Speech of Lee Rigby’s Killer’
. The Independent, 2015.
Google Scholar
RTF
EndNote XML
Building and Civil Engineering Institute (ZRMK Institute), Department of Geotechnical Engineering and Geology
., 2015.
Google Scholar
RTF
EndNote XML
Kennedy, Scott
, and
David A. Parker
.
"
Building China’s ‘One Belt, One Road
."
Center for Strategic & International Studies
(2015).
Google Scholar
RTF
EndNote XML
Davis, Adrian
.
"
Building Cyber-resilience into Supply Chains
."
Technology Innovation Management Review
5, no. 4 (2015): 19-27.
DOI
Google Scholar
RTF
EndNote XML
NATO
.
Building Integrity : Self-Assessment Questionnaire and Peer Review Process (Feb. 2015)
., 2015.
Google Scholar
RTF
EndNote XML
Bulgaria Country Risk Report
. BMI Research, 2015.
Google Scholar
RTF
EndNote XML
Tagarev, Todor
,
Petya Ivanova
, and
Nataly Ivanova
.
Bulgaria: Information on Capabilities, Organisations, Policies, and Legislation in Crisis Management and Disaster Response
In
IT4Sec Reports
. Sofia: Institute of Information and Communication Technologies, 2015.
Google Scholar
RTF
EndNote XML
Lyman, Rick
.
"
Bulgaria Puts Up a New Wall, but This One Keeps People Out
."
New York Times
(2015).
Google Scholar
RTF
EndNote XML
Ratchev, Valeri
.
Bulgaria’s 2014 Annual Defence Report: Plenty of Data, Low Political Impact
In
CSDM Views
. Sofia: Centre for Security and Defence Management, 2015.
DOI
Google Scholar
RTF
EndNote XML
Tagarev, Todor
.
On Bulgaria’s Defence Policy 2015-2020
In
CSDM Views
. Sofia: Centre for Security and Defence Management, 2015.
DOI
Google Scholar
RTF
EndNote XML
Bulgarian Foreign Policy, the Conflict “Russia – Ukraine,” and the National Security
. Alfa Research, 2015.
Google Scholar
RTF
EndNote XML
Bulgarian Foreign Policy, the Russia-Ukraine conflict, and National Security
., 2015.
Google Scholar
RTF
EndNote XML
Bulgarian Hotline for Fighting Illegal and Harmful Content in Internet
., 2015.
Google Scholar
RTF
EndNote XML
Sanders, Deborah
.
"
The Bulgarian Navy after the Cold War: Challenges of Building and Modernizing an Effective Navy
."
Naval War College Review
68, no. no. 2 (2015).
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
184
185
186
187
188
189
190
191
192
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance