Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21415 results:
RTF
EndNote XML
2015
S. Rajini, Nirmala Sugirtha
.
"
Access Control in Healthcare Information Management Systems Using Biometric Authentication
."
International Journal of Applied Environmental Sciences (IJAES)
10, no. 1 (2015).
Google Scholar
RTF
EndNote XML
Acquisition Community Connection на Defense Acquisition University
., 2015.
Google Scholar
RTF
EndNote XML
Action Plan for Protection of Children and Prevention of Violence over Children via Information Communication Technologies in Bosnia and Herzegovina 2014-2015
., 2015.
Google Scholar
RTF
EndNote XML
Additional Protocol to the Council of Europe Convention on the Prevention of Terrorism
In
Council of Europe Treaty Series
. Riga, 2015.
Google Scholar
RTF
EndNote XML
Kristensen, Hans M.
.
"
Adjusting NATO’s Nuclear Posture
."
Federation of American Scientists
(2015).
Google Scholar
RTF
EndNote XML
Administration of the Republic of Slovenia for Civil Protection and Disaster Relief (ACPDR)
., 2015.
Google Scholar
RTF
EndNote XML
Advanced Cyber Defence Centre Home Page
., 2015.
Google Scholar
RTF
EndNote XML
Wrightson, Tyler
.
Advanced Persistent Threat Hacking
. McGraw-Hill Education, 2015.
Google Scholar
RTF
EndNote XML
Smith-Clay, Deborah
.
Advancing Nursing Students' Knowledge Acquisition and Critical Thinking Abilities through Strategic Exposure to Simulation Clinical Training
. Northcentral University, 2015.
Google Scholar
RTF
EndNote XML
AEK
., 2015.
Google Scholar
RTF
EndNote XML
After Action Review – Kazakhstan NCO Symposium
. Astana: Office of Military Cooperation in Astana, 2015.
Google Scholar
RTF
EndNote XML
After the Election: Fundamental Security Challenges Nigeria Must Face
. Washington, D.C., 2015.
Google Scholar
RTF
EndNote XML
Chen, Adrian
.
"
The Agency
."
The New York Times
(2015).
Google Scholar
RTF
EndNote XML
Agency for Electronic Communications
., 2015.
Google Scholar
RTF
EndNote XML
Agency for Radwaste Management (ARAO)
., 2015.
Google Scholar
RTF
EndNote XML
Agency of the Republic of Slovenia for Agricultural Markets and Rural Development
., 2015.
Google Scholar
RTF
EndNote XML
"
The Agenda of the NATO Summit in Warsaw
." In
Federal Academy for Security Policy, Berlin, 2015
., 2015.
Google Scholar
RTF
EndNote XML
Traneva, Velichka
,
Evdokia Sotirova
,
Veselina Bureva
, and
Krassimir Atanassov
.
"
Aggregation Operations over 3-dimensional Extended Index Matrices
."
Advanced Studies in Contemporary Mathematics (Kyungshang)
25, no. 3 (2015): 407-416.
Google Scholar
RTF
EndNote XML
Yetkin, Murat
.
"
The AKP’s Nightmare: Going to Elections with the HDP
."
Hurriyet Daily News
(2015).
Google Scholar
RTF
EndNote XML
Aksenov: arest Kievom imushchestva Kryma– vystrel vcholostuju [Aksenov: Arrest by Kyiv of Crimean Property – A Blank Shot]
. Vesti.ru, 2015.
Google Scholar
RTF
EndNote XML
Murphy, Flynn
.
Alarm Over Terrorism Leads Australian Police to Take Eyes off Organised Crime Groups
. Telegraph, 2015.
Google Scholar
RTF
EndNote XML
Tzvetkov, Georgi
,
Philip Spassov
,
Vesselin Petkov
, and
Todor Tagarev
.
Albania: Capabilities, Organisations, Policies, and Legislation in crisis management and disaster response
In
IT4Sec Reports
. Sofia: Institute of Information and Communication Technologies, 2015.
Google Scholar
RTF
EndNote XML
Albanian Civil Protection
., 2015.
Google Scholar
RTF
EndNote XML
Alexander Ovechkin
. Wikipedia, 2015.
Google Scholar
RTF
EndNote XML
Bohn, Lauren
.
All Our Young People Have Gone to the Mountains’. Inside Turkey’s revived war against the Kurds
. The Atlantic, 2015.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
181
182
183
184
185
186
187
188
189
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance