Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21404 results:
RTF
EndNote XML
2015
Cools, Marc
,
Kathleen Van Acker
,
Eddy Testelmans
,
David Stans
,
Veerle Pashley
,
Robin Libert
, and
Patrick Leroy
.
1915-2015: Het verhaal van de Belgische militaire inlichtingen-en veiligheidsdienst
. Maklu-Uitgevers, 2015.
Google Scholar
RTF
EndNote XML
The 2015 Ageing Report: Economic and budgetary projections for the 28 EU Member States (2013-2060)
In
European Economy
., 2015.
Google Scholar
RTF
EndNote XML
2015 Global Megatrends in Cybersecurity
. Ponemon Institute, 2015.
Google Scholar
RTF
EndNote XML
Gavrila, Razvan
.
The 2015 Report on National and International Cyber Security Exer-cises: Survey, Analysis and Recommendations
. Heraklion, Greece: ENISA, 2015.
Google Scholar
RTF
EndNote XML
2015 Year in Review
. Facebook Newsroom, 2015.
Google Scholar
RTF
EndNote XML
About
. Metamorphosis, 2015.
Google Scholar
RTF
EndNote XML
About Cyber Security Challenge UK
. CESG, 2015.
Google Scholar
RTF
EndNote XML
About Enterprise Architecture Analysis Tool
. KTH Royal Institute of Technology, 2015.
Google Scholar
RTF
EndNote XML
About Hedayah
. Hedayah, 2015.
Google Scholar
RTF
EndNote XML
Chekalenko, Lyudmila
.
"
About the concept of ‘hybrid war’
."
Veche
5 (2015).
Google Scholar
RTF
EndNote XML
About Us
. United Nations Peacekeeping, 2015.
Google Scholar
RTF
EndNote XML
About Us (Financial Action Task Force)
. Financial Action Task Force, 2015.
Google Scholar
RTF
EndNote XML
Dhanjani, Nitesh
.
Abusing the Internet of Things - Blackouts, Freakouts and Stakeouts
. Sebastopol, CA: O’Reilly, 2015.
Google Scholar
RTF
EndNote XML
S. Rajini, Nirmala Sugirtha
.
"
Access Control in Healthcare Information Management Systems Using Biometric Authentication
."
International Journal of Applied Environmental Sciences (IJAES)
10, no. 1 (2015).
Google Scholar
RTF
EndNote XML
Acquisition Community Connection на Defense Acquisition University
., 2015.
Google Scholar
RTF
EndNote XML
Action Plan for Protection of Children and Prevention of Violence over Children via Information Communication Technologies in Bosnia and Herzegovina 2014-2015
., 2015.
Google Scholar
RTF
EndNote XML
Additional Protocol to the Council of Europe Convention on the Prevention of Terrorism
In
Council of Europe Treaty Series
. Riga, 2015.
Google Scholar
RTF
EndNote XML
Kristensen, Hans M.
.
"
Adjusting NATO’s Nuclear Posture
."
Federation of American Scientists
(2015).
Google Scholar
RTF
EndNote XML
Administration of the Republic of Slovenia for Civil Protection and Disaster Relief (ACPDR)
., 2015.
Google Scholar
RTF
EndNote XML
Advanced Cyber Defence Centre Home Page
., 2015.
Google Scholar
RTF
EndNote XML
Wrightson, Tyler
.
Advanced Persistent Threat Hacking
. McGraw-Hill Education, 2015.
Google Scholar
RTF
EndNote XML
Smith-Clay, Deborah
.
Advancing Nursing Students' Knowledge Acquisition and Critical Thinking Abilities through Strategic Exposure to Simulation Clinical Training
. Northcentral University, 2015.
Google Scholar
RTF
EndNote XML
AEK
., 2015.
Google Scholar
RTF
EndNote XML
After Action Review – Kazakhstan NCO Symposium
. Astana: Office of Military Cooperation in Astana, 2015.
Google Scholar
RTF
EndNote XML
After the Election: Fundamental Security Challenges Nigeria Must Face
. Washington, D.C., 2015.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
180
181
182
183
184
185
186
187
188
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance