Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21415 results:
RTF
EndNote XML
2011
"
Not Sending Troops to Afghanistan the Right Decision–Senators
."
Interfax-Kazakhstan
(2011).
Google Scholar
RTF
EndNote XML
Putin, Vladimir
.
Novyi integracyonnyi proekt dlja Evrazii – budushchee, kotoroe rohzdaetsia segodnia [The New Integration Project for Eurasia: The Future Born Today]
. Izvestia, 2011.
Google Scholar
RTF
EndNote XML
Van Damme, R.
,
R. Beckers
, and
J.C. Moureau
.
Nuclear Facilities Emergency Planning in Belgium
., 2011.
Google Scholar
RTF
EndNote XML
S., Nye Joseph
.
"
Nuclear Lessons for Cyber Security?
"
Strategic Studies Quarterly
(2011): 31.
Google Scholar
RTF
EndNote XML
Nuclear Weapons and Arms Control
In
Arms Control Series
. Brookings, 2011.
Google Scholar
RTF
EndNote XML
Aloise, Gene
, and
John Pendleton
.
Nuclear Weapons: DoD and NNSA Need to Better Manage Scope of Future Refurbishments and Risks to Maintaining U.S. Commitments to NATO
In
report to congressional requesters
. Washington DC: United States Government Accountability Office, 2011.
Google Scholar
RTF
EndNote XML
Dorf, Michael C.
.
The ‘Obama Doctrine’: The Wisdom and Lawfulness of the President’s Take-No-Prisoners Approach
. Justia.com, 2011.
Google Scholar
RTF
EndNote XML
Boyle, Michael
.
"
Obama: ‘Leading from Behind’ on Libya
."
The Guardian
(2011).
Google Scholar
RTF
EndNote XML
Risen, Clay
.
"
Obama’s Non-doctrine Doctrine
."
The New York Times
(2011).
Google Scholar
RTF
EndNote XML
Thibodeau, Patrick
.
"
Obama Seeks Big Boost in Cybersecurity Spending
."
Computer- world
(2011).
Google Scholar
RTF
EndNote XML
Cohen, Tom
.
Obama Tells Families of 9/11 Victims that ‘Justice has been done’
. CNN Politics , 2011.
Google Scholar
RTF
EndNote XML
OCTA EU Organised Crime Threat Assessment
. EUROPOL, 2011.
Google Scholar
RTF
EndNote XML
Open Letter on Middle East Policy: Lasting Peace Only Possible with Hamas on Board
. Spiegel Online International, 2011.
Google Scholar
RTF
EndNote XML
Operation Just Cause
. Global Security, 2011.
Google Scholar
RTF
EndNote XML
Operation Unified Protector: Final Mission Stats
., 2011.
Google Scholar
RTF
EndNote XML
Winter, Andreas C.
.
Operational Implications of the NATO Strategic Concept 2010 for European Countries in NATO and the EU
In
Monograph
. Fort Leavenworth, Kansas: United States Army Command and General Staff College, 2011.
Google Scholar
RTF
EndNote XML
Operativni Taktični Postopki
. Ministry of Defence, 2011.
Google Scholar
RTF
EndNote XML
Yergin, Daniel
.
"
Opinion: America’s New Energy Security
."
Wall Street Journal
(2011).
Google Scholar
RTF
EndNote XML
Hua, Jian
, and
Sanjay Bapna
.
Optimal IS Security Investment: Cyber Terrorism vs. Common Hacking
In
CIS 2011 Proceedings
. Vol. 4., 2011.
Google Scholar
RTF
EndNote XML
Organised Crime National Situation Report 2011
. Bundeskriminalamt, 2011.
Google Scholar
RTF
EndNote XML
Garcia, Miguel
,
Illir Gashi
,
Nuno Neves
,
Rafael Obelheiro
, and
Alysson Bessani
.
OS Diversity for Intrusion Tolerance: Myth or Reality
In
Performance and De¬pendability Symposium, the International Conference on Dependable Systems and Networks
., 2011.
Google Scholar
RTF
EndNote XML
Almeida, José Bacelar
,
Maria João Frade
,
Jorge Sousa Pinto
, and
Simão Melo de Sousa
.
"
An Overview of Formal Methods Tools and Techniques
." In
Rigorous Software Development: An Introduction to Program Verification
, 15-44. London, 2011.
DOI
Google Scholar
RTF
EndNote XML
McNamara, Sally
.
Overview of Security Issues in Europe and Eurasia
. The Heritage Foundation, 2011.
Google Scholar
RTF
EndNote XML
Gunaratna, Rohan
, and
Khuram Iqbal
.
Pakistan: Terrorism Ground Zero
. London: Reaktion Books, 2011.
Google Scholar
RTF
EndNote XML
Brusca, Carol S.
.
"
Palermo Protocol: The First Ten Years after Adoption
."
Global Security Studies
2, no. 3 (2011).
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
391
392
393
394
395
396
397
398
399
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance