Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21415 results:
RTF
EndNote XML
2012
Advanced Distributed Learning (ADL) Initiative
In
Experience API. Draft Specification
., 2012.
Google Scholar
RTF
EndNote XML
Adventures with Daisy in Thunderbolt-DMA-land: Hacking Macs through the Thunderbolt interface
. Break&Enter.org, Security News, Tools & Methodology, 2012.
Google Scholar
RTF
EndNote XML
Tolipov, Farhod
.
Afghan Worries Prompt US Defence Aid for Uzbekistan
. Institute for War and Peace Reporting, 2012.
Google Scholar
RTF
EndNote XML
Afghanistan Index: Tracking Variables of Reconstruction & Security in Post-9/11 Afghanistan
. Brookings Institute, 2012.
Google Scholar
RTF
EndNote XML
Afghanistan to 2015 and Beyond
In
Adelphi Series
. Vol. 425–26. International Institute for Strategic Studies, 2012.
Google Scholar
RTF
EndNote XML
Brzezinski, Zbigniew
.
"
After America
."
Foreign Policy
(2012): 26-29.
Google Scholar
RTF
EndNote XML
Barnett, Thomas P. M.
.
"
AirSea Battle: The Military-Industrial Complex’s Self-Serving Fantasy
."
Time
(2012).
Google Scholar
RTF
EndNote XML
Akhmed Chataev Innocent – MIA Compelled Witness to Sign Fake Testimonies
. Human-rights.ge, 2012.
Google Scholar
RTF
EndNote XML
Riedel, Bruce
.
"
Al Qaeda 3.0: Terrorism’s Emergent New Power Bases
."
The Daily Beast
(2012).
Google Scholar
RTF
EndNote XML
Orange, Richard
.
"
Al Qaeda Rejects Anders Behring Breivik Comparison
."
The Telegraph
(2012).
Google Scholar
RTF
EndNote XML
Nakashima, Ellen
, and
Joby Warrick
.
"
Al Qaeda’s Online Forums Go Dark for Extended Period
."
Washington Post
(2012).
Google Scholar
RTF
EndNote XML
Tola, Dorian
.
Albanian-NATO relations in the fight against international terrorism
. Monterey, California: Naval Postgraduate School, 2012.
Google Scholar
RTF
EndNote XML
Benkirane, Reda
.
The Alchemy of Revolution: The Role of Social Networks and New Media in the Arab Spring
. Geneva Centre for Security Policy, 2012.
Google Scholar
RTF
EndNote XML
Benkirane, Reda
.
"
The Alchemy of Revolution: The Role of Social Networks and New Media in the Arab Spring
."
GCSP Policy Paper
7 (2012).
Google Scholar
RTF
EndNote XML
Glenn, Russell W.
.
All Glory Is Fleeting: Insights from the Se¬cond Lebanon War
. Santa Monica, CA: RAND, 2012.
Google Scholar
RTF
EndNote XML
All Hazards Risk Assessment Methodology Guidelines 2012–2013
. Ottawa: Public Safety Canada, 2012.
Google Scholar
RTF
EndNote XML
Biryukov, Sergey
.
"
The All-Invasive Clientella
."
Svobodnaya Mysl
7 (2012): 32-33.
Google Scholar
RTF
EndNote XML
.
Almanac 2012: Governing and Reforming Kyrgyzstan Security Sector
., 2012.
Google Scholar
RTF
EndNote XML
al-Filastini, Abu Qatada
.
al-Muqaraba li nazilat al-’asr
. Copenhagen: al-Nur, 2012.
Google Scholar
RTF
EndNote XML
Raghavan, Sudarsan
, and
Peter Finn
.
"
Al-Qaeda bombmaker Ibrahim Hassan al-Asiri has tried to attack the U.S. three times, officials say
."
Washington Post
(2012).
Google Scholar
RTF
EndNote XML
Gonçalves, Francisco
.
"
A Ameaça Jihadista nos Estabelecimentos Prisionais: Desafios e Dilemas
."
Nação e Defesa
132 (2012): 192-211 .
Google Scholar
RTF
EndNote XML
Panetta, Leon E.
.
America’s Pacific Rebalance
In
Project Syndicate
., 2012.
Google Scholar
RTF
EndNote XML
Zareapoor, Masoumeh
,
K.R. Seeja
, and
M.Afshar.Alam
.
"
Analysis of Credit Card Fraud Detection Techniques: based on Certain Design Criteria
."
International Journal of Computer Applications (0975 – 8887)
52, no. 3 (2012).
Google Scholar
RTF
EndNote XML
Tagarev, Todor
,
Venelin Georgiev
, and
Petya Ivanova
.
"
Analytical Support to Critical Infrastructure Protection Policy and Investment Decision-Making
."
Information & Security: An International Journal
28, no. 1 (2012): 13-20.
DOI
Google Scholar
RTF
EndNote XML
Annexes to Chapter 1 of the Small Arms Survey 2011: States of Security
., 2012.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
323
324
325
326
327
328
329
330
331
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance