Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21387 results:
RTF
EndNote XML
2011
Georgiev, Venelin
, and
Todor Tagarev
.
Balancing Ambitions and Resource Constraints in Shaping Collective Security and Defence Policies
In
IT4Sec Reports
. Sofia: Institute of Information and Communication Technologies, 2011.
DOI
Google Scholar
RTF
EndNote XML
Wong, Edward
.
"
Beijing Warns U.S. About South China Sea Disputes
."
New York Times
(2011).
Google Scholar
RTF
EndNote XML
Steder, Frank
.
Benchmarking Studies and Capability Costing
. Paris: RTA, 2011.
Google Scholar
RTF
EndNote XML
Epstein, Zach
.
"
Berg: Smartphone shipments grew 74% in 2010
."
Boy Genius Report
(2011).
Google Scholar
RTF
EndNote XML
Barno, David W.
,
Andrew Exum
, and
Matthew Irvine
.
Beyond Afghanistan: A Regional Security Strategy for South and Central Asia
., 2011.
Google Scholar
RTF
EndNote XML
Lawson, Sean
.
Beyond cyber-doom: Cyberattack Scenarios and the Evidence of History
In
Working Paper
. Mercatus Center, George Mason University, 2011.
Google Scholar
RTF
EndNote XML
Lawson, Sean
.
"
Beyond Cyber-Doom: Cyberattack Scenarios and the Evidence of History
."
Working Paper
11, no. 01 (2011).
Google Scholar
RTF
EndNote XML
Zając, J.
.
"
Bezpieczeństwo – aspekty terminologiczne
." In
Współczesny wymiar bezpieczeństwa. Między teorią a praktyką
, 18. Warsaw: RWO, 2011.
Google Scholar
RTF
EndNote XML
Zięba, R.
.
"
Bezpieczeństwo jako cel polityki państwa: aspekty teoretyczne
." In
Współczesny wymiar bezpieczeństwa. Między teorią a praktyką
, 22-24. Warsaw: RWO, 2011.
Google Scholar
RTF
EndNote XML
Cheterian, Vicken
.
The Big Re-Freeze – Has the Regional Balance of Power Merely Cooled into a Different Configuration?
. The International Institute for Strategic Studies (IISS), 2011.
Google Scholar
RTF
EndNote XML
"
The Biological Weapon Convention Seventh Review Conference
." Geneva, 2011.
Google Scholar
RTF
EndNote XML
Dimitriadis, Giorgos
.
Black Sea Military Dynamics: The Reemergence Of Russia Military Presence In Black Sea States
. International Hellenic University, 2011.
Google Scholar
RTF
EndNote XML
Taleb, Nassim Nicholas
.
"
The Black Swan of Cairo
."
Foreign Affairs
90, no. 3 (2011).
Google Scholar
RTF
EndNote XML
Myers, Jody
.
Blow, Bling and Bucks: IMF Work Against Money Laundering and Terrorist Financing
. IMFDirect, 2011.
Google Scholar
RTF
EndNote XML
The Department of Homeland Security(DHS)
.
Blueprint for a Secure Cyber Future – The Cybersecurity Strategy for the Homeland Security Enterprise
., 2011.
Google Scholar
RTF
EndNote XML
Socor, Vladimir
.
Bluff in Substance, Brutal in Form: Moscow Warns Against Trans-Caspian Project
In
Eurasia Daily Monitor, Jamestown Foundation
. Vol. 8., 2011.
Google Scholar
RTF
EndNote XML
Weiss, Tomáš
.
"
The blurring border between the police and the military: A debate without foundations
."
Cooperation and Conflict
46, no. 3 (2011): 396-405.
Google Scholar
RTF
EndNote XML
Oluwajuyitan, Jide
.
Boko Haram and the Dialogue Option
. Jide Oluwajuyitan Blog, 2011.
Google Scholar
RTF
EndNote XML
Bloom, Mia
.
Bombshell: The Many Faces of Women Terrorists
. Toronto: Penguin Canada, 2011.
Google Scholar
RTF
EndNote XML
Bavelier, D.
,
C. S. Green
,
D. H. Han
,
P. F. Renshaw
,
M. M. Merzenich
, and
D. A. Gentile
.
"
Brains on Video Games
."
Nature Reviews - Neuroscience
12 (2011): 763-768.
Google Scholar
RTF
EndNote XML
de Ávila, Rafael Oliveira
, and
Rafael Pinto da Silva
.
"
Brasil informacional: a seguranca cibernética como desafio à seguranca nacional
." In
Encontro nacional de pesquisa em ciencia da informacao
., 2011.
Google Scholar
RTF
EndNote XML
O’Donnell, Clara Marina
.
Britain and France should not give up on EU defence co-operation
In
Policy Brief
. Center for European Reform, 2011.
Google Scholar
RTF
EndNote XML
Waterfield, Bruno
.
"
Britain blocks EU plans for ‘operational military headquarters’
."
The Telegraph
(2011).
Google Scholar
RTF
EndNote XML
Vidino, Lorenzo
.
"
The Buccinasco Pentiti: A Unique Case Study of Radicalization
."
Terrorism and Political Violence
23, no. 3 (2011): 398-418.
Google Scholar
RTF
EndNote XML
Yan, Chenyang
.
Build a Laboratory Cloud for Computer Network Education
. Singapore: ICCSE, 2011.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
367
368
369
370
371
372
373
374
375
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance