Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21404 results:
RTF
EndNote XML
2013
Kashin, Vasiliy B.
.
The sum of all fears, Russia in global politics
In
Russia in Global Politics
. Vol. 1 May 2013., 2013.
Google Scholar
RTF
EndNote XML
Byuzen, Toni
.
Supermyishlenie
. OOO “Popurri", 2013.
Google Scholar
RTF
EndNote XML
Urciuoli, Luca
,
Toni Männistö
,
Juha Hintsa
, and
Tamanna Khan
.
"
Supply Chain Cyber Security – Potential Threats
."
Information & Security: An International Journal
29, no. 1 (2013): 51-68.
DOI
Google Scholar
RTF
EndNote XML
Gardner, Timothy S.
.
"
Synthetic Biology: From Hype to Impact
."
Trends in Biotechnology
31, no. 3 (2013): 123-125.
Google Scholar
RTF
EndNote XML
Yan, Holly
.
Syria Allies: Why Russia, Iran and China are Standing by the Regime
. CNN.com, 2013.
Google Scholar
RTF
EndNote XML
Fitton, Oliver
, and
Mark Lacy
.
"
The Syrian Electronic Army Is Rewriting the Rules of War
."
The Conversation
(2013).
Google Scholar
RTF
EndNote XML
Jones, Adam
.
"
Syrian Electronic Army Turns on Assad Regime
."
Seczine: Security Magazine
(2013).
Google Scholar
RTF
EndNote XML
Ioannidis, S.
,
M. Stamatogiannakis
, and
Th. Petsas
.
SysSec Deliverable D7.3
In
Advanced Report on Cyberattacks on Lightweight Devices
., 2013.
Google Scholar
RTF
EndNote XML
Mortati, M.
.
Systemic Aspects of Innovation and Design: The Perspective of Collaborative Networks
. Cham, Switzerland: Springer, 2013.
Google Scholar
RTF
EndNote XML
Schmitt, Michael N.
.
Tallinn Manual on the International Law Applicable to Cyber Warfare
. New York: Cambridge University Press, 2013.
Google Scholar
RTF
EndNote XML
Schmitt, Michael N.
.
Tallinn Manual on the International Law Applicable to Cyber Warfare
. Cambridge: Cambridge University Press, 2013.
Google Scholar
RTF
EndNote XML
Weigel, David
.
"
Tamerlan Tsarnaev, Dead Bombing Suspect: ‘I Don’t Have a Single American Friend’
."
Slate
(2013).
Google Scholar
RTF
EndNote XML
Andersson, Hilary
.
Tamerlan Tsarnaev Had Right-Wing Extremist Literature
. BBC News, 2013.
Google Scholar
RTF
EndNote XML
Kashevarova, Anastasiya
, and
Yuliya Tsoy
.
"
Tamerlan Tsarnaev Was Recruited by a Georgian Fund
."
Izvestia
(2013).
Google Scholar
RTF
EndNote XML
Masters, Jonathan
.
Targeted Killings
In
Council on Foreign Relations, May 23, 2013
., 2013.
Google Scholar
RTF
EndNote XML
McDermott, Roger
.
"
Tashkent Strengthens Security Ties with Moscow Ahead of NATO Drawdown
."
Eurasia Daily Monitor
10, no. 36 (2013).
Google Scholar
RTF
EndNote XML
Technically Recoverable Shale Oil and Shale Gas Resources: An Assessment of 137 Shale Formations in 41 Countries Outside the United States
. U.S. Energy Information Administration (EIA), 2013.
Google Scholar
RTF
EndNote XML
Sbardella, Alex
.
Ten Tips for Mobile UX
. Red Ant Blog, 2013.
Google Scholar
RTF
EndNote XML
Acharya, A.
.
Ten years after 9/11: Rethinking the jihadist threat
., 2013.
Google Scholar
RTF
EndNote XML
Tensions Rise in Georgia’s Breakaway Regions
. Radio Free Europe – Radio Liberty, 2013.
Google Scholar
RTF
EndNote XML
Terrorism and Financial Intelligence
. US Department of the Treasury, 2013.
Google Scholar
RTF
EndNote XML
Freeman, Michael
, and
Moyara Ruehsen
.
"
Terrorism Financing Methods: An Overview
."
Perspectives on Terrorism
4, no. 7 (2013): 5-26.
Google Scholar
RTF
EndNote XML
Forster, Peter K.
.
"
Terrorist Innovation: Homegrown Terrorism and the Internet
." In
The Dangerous Landscape
, 79-86., 2013.
Google Scholar
RTF
EndNote XML
Abrams, Elliott
.
Tested by Zion: The Bush Administration and the Israeli-Palestinian Conflict
. Cambridge University Press, 2013.
Google Scholar
RTF
EndNote XML
Zimmerman, Katherine L.
.
"
Testimony: AQAP’s Role in the al Qaeda Network: Statement before the House Committee on Homeland Security Subcommittee on Counterterrorism and Intelligence
." In
Understanding the Threat to the Homeland from AQAP
. American Enterprise Institute for Public Policy Research (AEI), 2013.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
314
315
316
317
318
319
320
321
322
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance