Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21404 results:
RTF
EndNote XML
2020
ETSI TR 102 031-1 V1.1.1 (2002-01): Fixed Radio Systems. Point-to-point and point-to-multipoint equipment. Use of circular polarization in multipoint systems. Part 1: Systems aspects
In
Technical Report
. ETSI, 2020.
Google Scholar
RTF
EndNote XML
EU ERCC
., 2020.
Google Scholar
RTF
EndNote XML
EU versus Disinformation
. EU Commission, 2020.
Google Scholar
RTF
EndNote XML
EU-NATO Cooperation – Factsheets
. EEAS, 2020.
Google Scholar
RTF
EndNote XML
A European Competence Network of Cybersecurity Centres of Excellence: About
., 2020.
Google Scholar
RTF
EndNote XML
European network of Cybersecurity centres and competence Hub for innovation and Operations (ECHO)
., 2020.
Google Scholar
RTF
EndNote XML
EUvsDisinfo
., 2020.
Google Scholar
RTF
EndNote XML
Georgiev, Venelin
.
Evaluating the Utility of Distance Learning Forms during the Covid-19 Pandemic
In
IT4Sec Reports
., 2020.
DOI
Google Scholar
RTF
EndNote XML
Rogers, Peter
.
"
The Evolution of Resilience
."
Connections: The Quarterly Journal
19, no. 3 (2020): 13-32.
DOI
Google Scholar
RTF
EndNote XML
Hurak, Ihor
, and
Paul D’Anieri
.
"
The Evolution of Russian Political Tactics in Ukraine
."
Problems of Post-Communism
(2020).
DOI
Google Scholar
RTF
EndNote XML
Ishiwatari, Mikio
.
"
Evolving Concept of Resilience: Soft Measures of Flood Risk Management in Japan
."
Connections: The Quarterly Journal
19, no. 3 (2020): 99-107.
DOI
Google Scholar
RTF
EndNote XML
Ounda, Daniel
.
Examining the Role of Security Operations Centres (SOCs) in the Age of Cybercrime
. Kenya Engineer, 2020.
Google Scholar
RTF
EndNote XML
Chief Information Officer
.
Executive Guide
., 2020.
Google Scholar
RTF
EndNote XML
Dzhumashova, Aida
.
"
Exim Bank of China to Reschedule Debt of Kyrgyzstan
."
24.KG
(2020).
Google Scholar
RTF
EndNote XML
Stoianov, Nikolai
, and
Maya Bozhilova
.
"
Expert’s study on situational awareness of operations directed at the wide dissemination of malicious information
." In
Conference Proceedings, MODS2020
. Chernihiv, Ukraine, 2020.
Google Scholar
RTF
EndNote XML
Hendricks, Mohamed Natheem
.
"
Expertise, Epistemes and the Construction of a Suspect Community
." In
Manufacturing Terrorism in Africa
, 93-136. Singapore: Palgrave Macmillan, 2020.
Google Scholar
RTF
EndNote XML
Hendricks, Mohamed Natheem
.
"
Expertise, Epistemes and the Construction of a Suspect Community
." In
Manufacturing Terrorism in Africa
, 93-136. Singapore: Palgrave Macmillan, 2020.
Google Scholar
RTF
EndNote XML
Expertise in IICT–BAS
., 2020.
Google Scholar
RTF
EndNote XML
Facebook ad campaign helped Donald Trump win election, claims executive
. BBC, 2020.
Google Scholar
RTF
EndNote XML
Randall, Gerald
.
Factors Influencing Adoption of Laboratory Virtualization for College and University Cybersecurity Degree Programs: A Correlational Study
. Capella University, 2020.
Google Scholar
RTF
EndNote XML
Stines, Alan
.
Faculty Perceptions of Open Educational Resources in Cyber Curriculum: A Pilot Study
In
Business and Information Systems
. Vol. Doctor of Philosophy (PhD). Dakota State University, 2020.
Google Scholar
RTF
EndNote XML
Federal Emergency Management Agency. What Is Mitigation?
. Washington, D.C., 2020.
Google Scholar
RTF
EndNote XML
Federated Mission Networking
. Wikipedia, 2020.
Google Scholar
RTF
EndNote XML
Wisner, Ben
.
"
Five Years Beyond Sendai—Can We Get Beyond Frameworks?
"
International Journal of Disaster Risk Science
11 (2020): 239-249.
Google Scholar
RTF
EndNote XML
FortiWeb 5.7.1 Administration Guide: Solutions for specific web attacks
. Fortine, 2020.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
40
41
42
43
44
45
46
47
48
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance