Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21415 results:
RTF
EndNote XML
2015
Banking on Mobility over a Generation
In
Special Rapporteur’s June 2015 report on the EU
. UN, 2015.
Google Scholar
RTF
EndNote XML
Waszczykowski, Witold
.
"
The Battle For The Hearts and Minds: Countering Propaganda Attacks Against the Euro-Atlantic Community
." In
NATO Parliamentary Assembly, Committee on the Civil Dimension of Security
., 2015.
Google Scholar
RTF
EndNote XML
Bayesian network and simulation software for risk analysis and decision support AgenaRisk
., 2015.
Google Scholar
RTF
EndNote XML
Sigurðsson, Árni Þór
, and
Alyson J. K. Bailes
.
"
“The Bear and the Maiden Fair”: Why does Armenia side with Russia?
"
Rannsóknir í félagsvísindum XVI.
(2015).
Google Scholar
RTF
EndNote XML
Watson, Callum
.
"
Begging the Question: What Would a Men, Peace and Security Agenda Look Like?
"
Connections: The Quarterly Journal
14, no. 3 (2015): 45-60.
DOI
Google Scholar
RTF
EndNote XML
"
Belgium - Emergency planning
." In
Vademecum – Civil protection
. European Commission, 2015.
Google Scholar
RTF
EndNote XML
Rostek, K.
.
Benchmarking Collaborative Networks: A Key to SME Competitiveness
. Cham, Switzerland: Springer, 2015.
Google Scholar
RTF
EndNote XML
A. Yildirim, Kadir
, and
Caroline M. Lancaster
.
"
Bending with the Wind: Revisiting Islamist Parties’ Electoral Dilemma
."
Politics & Religion
8, no. 3 (2015).
Google Scholar
RTF
EndNote XML
Beveiliging tegen DDoS aanvallen
. NBIP, 2015.
Google Scholar
RTF
EndNote XML
Barret, Richard
.
Beyond the Caliphate: Foreign Fighters and the Threat of Returnees; Foreign Fighters: An Updated Assessment of the Flow of Foreign Fighters into Syria and Iraq
., 2015.
Google Scholar
RTF
EndNote XML
Bezbedno na internet
In
Site Summary
. Sitemeter.com, 2015.
Google Scholar
RTF
EndNote XML
Balabán, Miloš
, and
Bohuslav Pernica
.
Bezpečnostní systém ČR: problémy a výzvy
. Prague: Charles University in Prague, Karolinum Press, 2015.
Google Scholar
RTF
EndNote XML
"
The Biological and Toxin Weapon Trends Symposium
." In
IAP Global Network of Sci-ence Academies conference
., 2015.
Google Scholar
RTF
EndNote XML
Black Sea Earthquake Safety Net(work) – ESNET
., 2015.
Google Scholar
RTF
EndNote XML
Roslycky, Lada
.
Black Sea Security Program
. Bucharest, Romania, 2015.
Google Scholar
RTF
EndNote XML
Chauvin, Justine
.
"
Book Review: Cyber War Will Not Take Place
."
Interstate - Journal of International Affairs
2015/2016, no. 2 (2015).
Google Scholar
RTF
EndNote XML
Breaking Bodies: Torture and Summary Killings in Eastern Ukraine
. Vol. 30 June 2015. London: Amnesty International, 2015.
Google Scholar
RTF
EndNote XML
"
A Brief Interview with Umm Basir Al-Muhajirah
."
Dabiq
7 (2015): 50-51.
Google Scholar
RTF
EndNote XML
Krastev, Ivan
.
Britain’s gain is Eastern Europe’s brain drain
In
Ivan Krastev’s column in The Guardian
., 2015.
Google Scholar
RTF
EndNote XML
"
British Defense Minister Says Russia’s Putin Poses ‘Danger’ to Baltic States
."
The Moscow Times
(2015).
Google Scholar
RTF
EndNote XML
"
British Spies Don Wigs and Makeup to Testify at US Trial of Al-Qaida Suspect
."
The Guardian
(2015).
Google Scholar
RTF
EndNote XML
Broken Arrows: Nuclear Weapons Accidents
. Atomic Archive.com, 2015.
Google Scholar
RTF
EndNote XML
Stronski, Paul
.
"
Broken Ukraine
."
Foreign Affairs
(2015).
Google Scholar
RTF
EndNote XML
Moodley, Kiran
.
Brusthom Ziamani’s Girlfriend: ‘He’d Mimic the Speech of Lee Rigby’s Killer’
. The Independent, 2015.
Google Scholar
RTF
EndNote XML
Building and Civil Engineering Institute (ZRMK Institute), Department of Geotechnical Engineering and Geology
., 2015.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
184
185
186
187
188
189
190
191
192
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance