Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21415 results:
RTF
EndNote XML
2012
Fulghum, David A.
.
"
China Cyber-skills Are Improving But Still Don’t Top Russia and Israel
."
Aviation Week
(2012).
Google Scholar
RTF
EndNote XML
China Offers 10-Bln-USD SCO Loan
. Xinhua News Service, 2012.
Google Scholar
RTF
EndNote XML
Hansen, Flemming Splidsboel
.
"
China, Russia, and the Foreign Policy of the SCO
."
Connections: The Quarterly Journal
11, no. 2 (2012): 95-102.
DOI
Google Scholar
RTF
EndNote XML
Spade, Jayson M.
.
China’s Cyber Power and America’s National Security
. Carlisle, PA: U.S. Army War College, 2012.
Google Scholar
RTF
EndNote XML
China’s Investment in the Countries of Central Asia Are Almost $250 Billion—Wen Jiabao
. Kyrgyz Telegraph Agency, 2012.
Google Scholar
RTF
EndNote XML
Richardson, Michael
.
"
China’s Thirst for Oil and Gas
."
Canberra Times
(2012).
Google Scholar
RTF
EndNote XML
Walton, Timothy A.
.
China’s Three Warfares
. Herndon, VA: Delex Systems, 2012.
Google Scholar
RTF
EndNote XML
China Seeks Regional Energy Cooperation as Challenges Mount
. People’s Daily Online, 2012.
Google Scholar
RTF
EndNote XML
Yuan, Luo
.
China Should Stay Calm, Alert about U.S. Strategy Adjustments
. PLA Daily, 2012.
Google Scholar
RTF
EndNote XML
Jiao, Wu
.
"
China Welcomes US Role in Asia-Pacific Region
."
China Daily
(2012).
Google Scholar
RTF
EndNote XML
Malhotra, A.
.
Chinese Inroads into Central Asia: Focus on Oil and Gas
. Journal of Energy Security, 2012.
Google Scholar
RTF
EndNote XML
Illiashenko, Oleg
, and
Eugene Babeshko
.
"
Choosing FMECA-Based Techniques and Tools for Safety Analysis of Critical Systems
."
Information & Security: An International Journal
28, no. 2 (2012): 275-285.
DOI
Google Scholar
RTF
EndNote XML
CIA World Factbook - Armenia
., 2012.
Google Scholar
RTF
EndNote XML
Kilcullen, David
.
"
The City as a System: Future Conflict and Urban Resilience
."
The Fletcher Forum of World Affairs
36, no. 2 (2012): 19-39.
Google Scholar
RTF
EndNote XML
Procházková, Dana
.
"
Civil protection
." In
International Conference on “Global Existential Risks” (Globálne existenciálne riziká)
. Žilina, 2012.
Google Scholar
RTF
EndNote XML
Civil Protection Cooperation for the Candidate Countries and Potential Candidates
In
Analytical Study on Host Nation Support
., 2012.
Google Scholar
RTF
EndNote XML
Tagarev, Todor
.
Civilian Control in Defence (in Russian)
., 2012.
Google Scholar
RTF
EndNote XML
Appelrouth, Scott A.
, and
Laura Desfor Edles
.
Classical and Contemporary Theory
. 2nd Edition ed. Thousand Oaks, CA: Pine Forge Press, 2012.
Google Scholar
RTF
EndNote XML
Grishin, Vladimir
.
Classical Control Theory and Methods of Artificial Intelligence. Curse of Dimensionality
., 2012.
Google Scholar
RTF
EndNote XML
Brzoska, Michael
.
"
Climate change and the military in China, Russia, the United Kingdom, and the United States
."
Bulletin of the Atomic Scientists
62, no. 2 (2012): 43-54, p. 48.
Google Scholar
RTF
EndNote XML
Clover, Charles
.
"
Clinton Vows Thwart New Soviet Union
."
Financial times
(2012).
Google Scholar
RTF
EndNote XML
Vilkomir, Sergiy
.
"
Cloud Testing: A State-of-the-Art Review
."
Information & Security: An International Journal
28, no. 2 (2012): 213-222.
DOI
Google Scholar
RTF
EndNote XML
Capodieci, A.
,
A.L. Guido
,
L. Mainetti
, and
U. Barchetti
.
"
Collaborative Process Management for the Networked Enterprise: A Case Study
." In
26th IEEE International Conference on Advanced Information Networking and Applications Workshops
. WAINA, 2012.
DOI
Google Scholar
RTF
EndNote XML
Williamson, Wade
.
Combating Emerging Threats Through Security Collaboration
. Security Week, 2012.
Google Scholar
RTF
EndNote XML
Silk, Dan
.
Community Policing to Prevent Violent Extremism
In
FBI Law Enforcement Bulletin
., 2012.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
327
328
329
330
331
332
333
334
335
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance