Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21414 results:
RTF
EndNote XML
2008
Dygalo, Igor
.
"
The Russian Navy Calls on All Countries to Unite Against Piracy
."
Izvestia
(2008).
Google Scholar
RTF
EndNote XML
Kazantsev, Andrei
.
"
Russian Policy in Central Asia and the Caspian Sea Region
."
Europe-Asia Studies
60, no. 6 (2008): 1073-1088.
Google Scholar
RTF
EndNote XML
Kaczmarski, Marcin
.
"
The Russian Proposal for a New European Security System
."
CES Commentary
11, no. 16 (2008): 2.
Google Scholar
RTF
EndNote XML
Cohen, Ariel
.
The Russian-Georgian War: A Challenge for the U.S. and the World
In
WebMemo 2017
. The Heritage Foundation, 2008.
Google Scholar
RTF
EndNote XML
Russland steigert Militärausgaben um 25 Prozent
. Welt Online, 2008.
Google Scholar
RTF
EndNote XML
Friedman, George
.
"
The Russo-Georgian War and the Balance of Power
."
Stratfor Global Intelligence
(2008).
Google Scholar
RTF
EndNote XML
Sapmaz, Ahmet
.
Rusya’nın Transkafkasya Politikası ve Türkiye’ye Etkileri
., 2008.
Google Scholar
RTF
EndNote XML
Haggerty, Alan E.
.
S& T and Maneuver Warfare: A Current Success and a Future Challenge
., 2008.
Google Scholar
RTF
EndNote XML
Saakashvili Outlines Tbilisi’s Abkhaz Initiatives
. Civil Georgia, 2008.
Google Scholar
RTF
EndNote XML
Saakashvili’s Inaugural Address: Hitting the Right Notes. Embassy Tbilisi Unclassified Cable
. Wikileaks Cable Gate Archive, 2008.
Google Scholar
RTF
EndNote XML
Procházková, Dana
.
"
Safety, Security and Risk
." In
Security and Safety Management and Public Administration
. Praha: Police Academy of the Czech Republic, 2008.
Google Scholar
RTF
EndNote XML
Hughes, Dominic
.
Sarkozy’s Georgia Gamble Pays Off
. BBC News, 2008.
Google Scholar
RTF
EndNote XML
M. Sarkozy, Nicolas
.
Sarkozy, Speech at the World Policy Conference
. Evian, 2008.
Google Scholar
RTF
EndNote XML
Armando, Alessandro
, and
Luca Compagna
.
"
SAT-based Model-Checking for Security Protocols Analysis
."
International Journal of Information Security
7, no. 1 (2008): 3-32.
DOI
Google Scholar
RTF
EndNote XML
Boucek, Christopher
.
Saudi Arabia’s ‘Soft’ Counter-Terrorism Strategy: Prevention, Rehabilitation, and Aftercare
In
Carnegie Papers
., 2008.
Google Scholar
RTF
EndNote XML
Penev, Nikolai
.
Savremenni komunikatcionni sistemi i tehnologii
. Sofia: Publishing House "Vanio Nedkov", 2008.
Google Scholar
RTF
EndNote XML
Graham, Loren
, and
Irina Dezhina
.
Science in the New Russia: Crisis, Aid, Reform
. Bloomington: IN: Indiana University Press, 2008.
Google Scholar
RTF
EndNote XML
Securing Business against War Driving
In
TechDoc
., 2008.
Google Scholar
RTF
EndNote XML
Securing Cyberspace for the 44th Presidency. Report of the CSIS Commission on Cybersecurity for the 44th Presidency
. Washington, D.C.: Center for Strategic and International Studies, 2008.
Google Scholar
RTF
EndNote XML
Securing Peace and Development: The Role of the United Nations in Supporting Security Sector Reform
. Secretary-General, 2008.
Google Scholar
RTF
EndNote XML
"
Securing the homeland: critical infrastructure, risk and (in)security. Introduction
." In
Securing 'the Homeland': Critical Infrastructure, Risk and (In)Security
. Routledge, 2008.
Google Scholar
RTF
EndNote XML
Baran, Zeyno
.
Security Aspects of the South Stream Project
. Brussels: European Parliament, 2008.
Google Scholar
RTF
EndNote XML
Booth, Ken
, and
Nicholas J. Wheeler
.
The Security Dilemma: Fear, Cooperation and Trust in World Politics
. New York: Palgrave Macmillan, 2008.
Google Scholar
RTF
EndNote XML
Sherr, James
.
"
Security in the Black Sea Region: Back to Realpolitik?
"
Southeast European and Black Sea Studies
8, no. 2 (2008): 141-53.
Google Scholar
RTF
EndNote XML
Borisov, Nikita
,
Ian Goldberg
, and
David Wagner
.
Security of the WEP Algorithm
. UC Berkeley, 2008.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
504
505
506
507
508
509
510
511
512
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance