Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21386 results:
RTF
EndNote XML
2016
Trump Fine With ‘Breakup’ of NATO
. Newsmax, 2016.
Google Scholar
RTF
EndNote XML
Wood, Paul
.
The Truth About Islamic State: It’s in Crisis!
. The Spectator, 2016.
Google Scholar
RTF
EndNote XML
MIC
.
Tsushin Riyou Dokou Chosa [Research for the Use of Telecommunication]
., 2016.
Google Scholar
RTF
EndNote XML
Zagorodnyuk, Andriy
.
"
The Turning Point For Ukrainian Military Reform: What Is the Strategic Defence Bulletin and Why Is It So Important?
"
Ukrayinska Pravda
(2016).
Google Scholar
RTF
EndNote XML
Oswald, Holger M.
.
Ukraine Crisis and Transatlantic Security Relations: Causesf Reassessment of Strategy and Partnership
. Vol. Master. Monterey, California: Naval Postgraduate School, 2016.
Google Scholar
RTF
EndNote XML
Pot, ii, Oleksandr V.
, and
Roman V. Oliynykov
.
"
Ukrainian Educational System in the Field of Cybersecurity
."
Information & Security: An International Journal
35, no. 1 (2016): 11-27.
DOI
Google Scholar
RTF
EndNote XML
Paraszczuk, Joanna
.
Umar from the Caucasus’ is Emir of Nusra’s Liwa al-Muhajireen Wal Ansar
. From Chechnya to Syria, 2016.
Google Scholar
RTF
EndNote XML
Paraszczuk, Joanna
.
Umar Shishani’s Biographer Distances Him from Imarat Kavkaz Bayah
. From Chechnya to Syria, 2016.
Google Scholar
RTF
EndNote XML
Rukavishnikov, Vladimir
.
"
Understanding Putin's Foreign and Security Policy: Lessons from the Russian Transition
." In
Shifting Priorities in Russia's Foreign and Security Policy
, 35-71. Routledge, 2016.
Google Scholar
RTF
EndNote XML
Best, Neil
,
Mark Huber
, and
Todor Tagarev
.
Understanding the impact of good governance and corruption on defence institution building: A reference curriculum for educators
. Brussels: NATO, 2016.
Google Scholar
RTF
EndNote XML
Lavoix, Helene
.
Understanding the Islamic State system – Wilayat and Wali in Yemen
. The Red (Team) Analysis Society, 2016.
Google Scholar
RTF
EndNote XML
Altstadt, Audrey L.
, and
Rajan Menon
.
"
Unfrozen Conflict in Nagorno-Karabakh: Why Violence Persists
."
Foreign Affairs
(2016).
Google Scholar
RTF
EndNote XML
Demchak, Chris
,
Jason Kerben
,
Jennifer McArdle
, and
Francesca Spidalieri
.
United States of America: Cyber Readiness at a Glance
. Potomac Institute for Policy Studies, 2016.
Google Scholar
RTF
EndNote XML
Asare-Nuamah, Peter
, and
Agyepong Emmanuel Darko
.
"
University Students’ Perceptions on the Adoption of Electronic Voting
."
Global Journal of Interdisciplinary Social Sciences
5, no. 6 (2016): 7-13.
Google Scholar
RTF
EndNote XML
Obama, Barak
.
Upholding the Legacy of Those We Lost on September 11th
., 2016.
Google Scholar
RTF
EndNote XML
Poposka, Vesna
.
"
The Urge for Comprehensive Cyber Security Strategies in the Western Balkan
."
Information & Security: An International Journal
34, no. 1 (2016): 25-36.
DOI
Google Scholar
RTF
EndNote XML
"
US Military Admits Al-Qaeda is Stronger in Afghanistan than Previously Estimated
."
The Long War Journal
(2016).
Google Scholar
RTF
EndNote XML
Rumer, Eugene
,
Richard Sokolsky
, and
Paul Stronski
.
US Policy Toward Central Asia 3.0
. Carnegie Endowment for International Peace, 2016.
Google Scholar
RTF
EndNote XML
Jemberga, Sanita
, and
Evita Puriņa
.
U.S. Pressures Latvia To Clean Up Its Non-Resident Banks
. Re:Baltica, 2016.
Google Scholar
RTF
EndNote XML
Hang, Nguyen Thi Thuy
.
"
The US Rebalance towards the Asia-Pacific: Really Realist?, Research Article
."
Journal of Asian Security and International Affairs
3, no. 3 (2016): 291-306.
DOI
Google Scholar
RTF
EndNote XML
Norris, Robert S.
, and
Hans M. Kristensen
.
"
US tactical nuclear weapons in Europe, 2011
."
Bulletin of the Atomic Scientists 67, no. 1 (2011): 64–73
(2016).
Google Scholar
RTF
EndNote XML
Kacprzyk, Artur
.
USA mobilizuje NATO do wzmocnienia wschodniej flanki
. Polska Zbrojna, 2016.
Google Scholar
RTF
EndNote XML
Rusumanov, Vase
.
"
The Use of the Internet by Terrorist Organizations
."
Information & Security: An International Journal
34, no. 2 (2016): 137-150.
DOI
Google Scholar
RTF
EndNote XML
Tsukahara, Kenichi
, and
Noriyasu Kachi
.
"
Using Data and Statistics to Explain Investment Effectiveness on Flood Protection
."
Journal of Disaster Research
11, no. 6 (2016): 1238-1243.
DOI
Google Scholar
RTF
EndNote XML
Parsa, Younes
,
Hossein Eskandarpour
, and
Hasan Hosseinzadeh
.
"
Using Image Processing to Present an Intelligent Method for License Plate Recognition
."
International Journal of Computer Science and Information Security (IJCSIS)
14, no. 5 (2016).
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
176
177
178
179
180
181
182
183
184
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance