Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21415 results:
RTF
EndNote XML
2012
van Beusekom, Marcella
.
‘A door neither closed nor open’: Een onderzoek naar de betrekkingen tussen Oekraïne en de Europese Unie, 2004-2010
In
Graduate School for Humanities
. Universiteit van Amsterdam, 2012.
Google Scholar
RTF
EndNote XML
Doubts over Real Target of Uzbek ‘terror’ Blast
. Bishkek: Times of Central Asia, 2012.
Google Scholar
RTF
EndNote XML
Tagarev, Todor
.
On the draft law on the management and the functioning of the system for protecting national security
In
CSDM Views
. Sofia: Centre for Security and Defence Management, 2012.
DOI
Google Scholar
RTF
EndNote XML
Tarand, Indrek
.
Draft report by MEP
. MEP, 2012.
Google Scholar
RTF
EndNote XML
Karabeliova, Sonya
.
Dynamics of Value Organizations and Cultural Practices in the Bulgarian Socio-Cultural Context [Dinamika na tsennostnite organizatsii i kulturnite praktiki v bulgarskiya sotsiokulturen kontekst]
. Vol. Resume of dissertation. Sofia: University “Sv. Kliment Okhridski, 2012.
Google Scholar
RTF
EndNote XML
Eastern Partnership: A Roadmap to the Autumn 2013 Summit
. European Commission, 2012.
Google Scholar
RTF
EndNote XML
Hua, Jian
, and
Sanjay Bapna
.
"
The economic impact of cyber terrorism
."
The Journal of Strategic Information Systems
(2012).
Google Scholar
RTF
EndNote XML
Kharchenko, Vyacheslav
.
"
Editorial: Critical Infrastructures Safety and Security. Trends in the Context of Information Technology Development
."
Information & Security: An International Journal
28, no. 1 (2012): 5-10.
DOI
Google Scholar
RTF
EndNote XML
"
Editorial: Yahoo 19 Nichi kara Mail Rendou Koukoku [Yahoo Japan Launches Interest Advertisements]
."
Nikkei Shimbun
(2012).
Google Scholar
RTF
EndNote XML
Barrett, Jim
.
"
Education for Reform: New Students, New Methods, New Assessments
."
Connections: The Quarterly Journal
11, no. 4 (2012): 34-42.
DOI
Google Scholar
RTF
EndNote XML
Kostova, Nevena
.
Effective Aviation Transport Security Management through a Balanced Scorecard
In
It4Sec Reports
. Institute of Information and Communication Technologies, 2012.
DOI
Google Scholar
RTF
EndNote XML
van den Homberg, M
,
R Pieneman
, and
J van de Kuijt
.
Effectiveness of a Multi-Stage Collaboration Network for Early Integration of Multiple Perspectives on Emerging and Future Crises
., 2012.
Google Scholar
RTF
EndNote XML
Rana, Nripendra P.
,
Yogesh K. Dwivedi
, and
Michael D. Williams
.
"
E-Government Adoption Research: Analysing challenges and Critical Success Factors
." In
European, Mediterranean & Middle Eastern Conference on Information Systems (EMCIS2012)
. Munich, Germany, 2012.
Google Scholar
RTF
EndNote XML
"
Egyptian Army Declares Success in Crackdown on Sinai Terrorists
."
Times of Israel
(2012).
Google Scholar
RTF
EndNote XML
Egyptian Border Guards Killed in Sinai Attack
. Al Jazeera, 2012.
Google Scholar
RTF
EndNote XML
de Freitas, Sara
, and
Jill Jameson
.
The E-Learning Reader
. London and New York: Continuum Books, 2012.
Google Scholar
RTF
EndNote XML
Masud, Anwar Hossain
, and
Xiaodi Huang
.
"
An E-learning System Architecture based on Cloud Computing
."
World Academy of Science, Engineering and Technology
62 (2012): 74-78.
Google Scholar
RTF
EndNote XML
Electricity Projects on Top of Ahmadinejad’s Agenda
. Somoso.com News, 2012.
Google Scholar
RTF
EndNote XML
Zulean, M.
, and
G. Prelipcean
.
"
Emergency preparedness in Romania: Dynamics, shortcomings and policy proposals
." In
Technological Forecasting and Social Change
., 2012.
DOI
Google Scholar
RTF
EndNote XML
Zyga, Ioanna-Nikoletta
.
Emerging Security Challenges: A Glue for NATO and Partners?
. NATO Defense College, 2012.
Google Scholar
RTF
EndNote XML
Andres, Richard B.
.
"
The Emerging Structure of Strategic Cyber Offense, Cyber Defense, and Cyber Deterrence
."
Cyberspace and National Security: Threats, Opportunities, and Power in a Virtual World
(2012): 89-104.
Google Scholar
RTF
EndNote XML
Souleimanov, Emil
.
Emil Souleimanov’s personal interview with an officer in the Ministry of the Interior of Dagestan
. Chechnya, 2012.
Google Scholar
RTF
EndNote XML
Holland, Benjamin Robert
.
Enabling Open Source Intelligence (OSINT) in private social networks
. Iowa: Iowa State University, 2012.
Google Scholar
RTF
EndNote XML
Gordon, Michael R.
, and
Bernard E. Trainor
.
The Endgame
. New York: Pantheon, 2012.
Google Scholar
RTF
EndNote XML
Belogorev, A. M.
.
Energy Problems in the Caspian Region: Risks and Potential for Russia
. Fifth Caspian Energy Forum, 2012.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
332
333
334
335
336
337
338
339
340
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance