Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21404 results:
RTF
EndNote XML
2015
Higgins, Kelly Jackson
.
Hospital Medical Devices Used As Weapons In Cyberattacks
. DARKreading, 2015.
Google Scholar
RTF
EndNote XML
Gertz, Bill
.
"
House Adds Funds to Counter Russian Info War
."
Washington Times
(2015).
Google Scholar
RTF
EndNote XML
Dawson, Gregory S.
,
Man Wai Ho
, and
Robert J. Kauffman
.
"
How are c-suite executives different? A comparative empirical study of the survival of American chief information officers
."
Decision Support Systems
74 (2015): 88-101.
Google Scholar
RTF
EndNote XML
Cederberg, Aapo
, and
Pasi Eronen
.
"
How Can Societies Be Defended Against Hybrid Threats?
"
Strategic Security Analysis
9 (2015).
Google Scholar
RTF
EndNote XML
Goldsmith, Jack L.
.
"
How Cyber Changes the Law of War
."
Current and Emerging Trends in Cyber Operations: Policy, Strategy and Practice
(2015).
Google Scholar
RTF
EndNote XML
Smith-Spark, Laura
, and
Deborah Feyerich
.
How ISIS New Hostage Strategy is Shifting the Goalposts
. CNN, 2015.
Google Scholar
RTF
EndNote XML
Stanley, Jason
.
How Propaganda Works
. Princeton University Press, 2015.
Google Scholar
RTF
EndNote XML
Studzińska, Zofia
.
"
How Russia, Step by Step, Wants to Regain an Imperial Role in the Global and European Security System
."
Connections: The Quarterly Journal
14, no. 4 (2015): 21-41.
DOI
Google Scholar
RTF
EndNote XML
Office, Department for Educat
.
How social media is used to encourage travel to Syria and Iraq briefing note for school
., 2015.
Google Scholar
RTF
EndNote XML
Mastracci, Davide
.
How the catastrophic American decision to disband Saddam’s military helped fuel the rise of ISIL
. National Post, 2015.
Google Scholar
RTF
EndNote XML
Jenkins, Brian Michael
.
How the Current Conflicts Are Shaping Future of Syria and Iraq
In
Perspective
. Rand Corporation, 2015.
Google Scholar
RTF
EndNote XML
Gardner, Frank
.
How the Dark Web Spurs a Spying ‘Arms Race’
. BBC News, 2015.
Google Scholar
RTF
EndNote XML
How the Islamic State Uses Women to Control Women
. Syria: Direct, 2015.
Google Scholar
RTF
EndNote XML
Harress, Christopher
.
"
How the Ukrainian Diaspora in the US Is Funding the War Effort in East Ukraine
."
International Business Times
(2015).
Google Scholar
RTF
EndNote XML
Wolf, Brett
.
HSBC loses senior anti-money laundering compliance executive
. Reuters, 2015.
Google Scholar
RTF
EndNote XML
Horne, Alistair
.
Hubris: The Tragedy of War in the Twentieth Century
. London: Weidenfeld & Nicolson, 2015.
Google Scholar
RTF
EndNote XML
Human Development Reports: GDP per capita (2011 PPP $)
In
United Nations Development Programme
., 2015.
Google Scholar
RTF
EndNote XML
Human Development Reports: Population, urban (% of population)
In
United Nations Development Programme
., 2015.
Google Scholar
RTF
EndNote XML
Minchev, Zlatogor
.
"
Human Factor Role for Cyber Threats Resilience
." In
Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare
., 2015.
Google Scholar
RTF
EndNote XML
McClain, Jonathan
,
Austin Silva
,
Glory Emmanuel
,
Benjamin Anderson
,
Kevin Nauer
,
Robert Abbott
, and
Chris Forsythe
.
"
Human Performance Factors in Cyber Security Forensic Analysis
."
Procedia Manufacturing
3 (2015): 5301-5307.
Google Scholar
RTF
EndNote XML
Vietti, Francesca
, and
Roberto Franzini Tibaldeo
.
"
A Human Rights and Ethical Lens on Security and Human Dignity: The Case Study of Syrian Asylum Seekers
."
Information & Security: An International Journal
33, no. 1 (2015): 35-53.
DOI
Google Scholar
RTF
EndNote XML
Hungarian Atomic Energy Authority
., 2015.
Google Scholar
RTF
EndNote XML
Hungarian Central Statistical Office
., 2015.
Google Scholar
RTF
EndNote XML
Hungarian Civil Protection Association
., 2015.
Google Scholar
RTF
EndNote XML
Hungarian Red Cross
., 2015.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
200
201
202
203
204
205
206
207
208
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance