Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21372 results:
RTF
EndNote XML
2015
Paul, Amanda
.
Iran's policy in the South Caucacus Between pragmatism and realpolitik, in The South Caucasus: Between integration and fragmentation
. European Policy Centre – SAM, 2015.
Google Scholar
RTF
EndNote XML
Doran, Jamie
, and
Najibullah Quraishi
.
ISIL and the Taliban
. Al-Jazeera, 2015.
Google Scholar
RTF
EndNote XML
"
Isis Advertises 10 Jobs in the ‘Caliphate’ Including Press Officers, Bomb Makers and Teachers
."
The Independent
(2015).
Google Scholar
RTF
EndNote XML
McCants, William
.
The ISIS Apocalypse: The History, Strategy, and Doomsday Vision of the Islamic State
. Washington, DC: Brookings, 2015.
Google Scholar
RTF
EndNote XML
Solomon, Erika
,
Guy Chazan
, and
Sam Jones
.
"
ISIS Inc.: How Oil Fuels the Jihadi Terrorists
."
Financial Times
(2015).
Google Scholar
RTF
EndNote XML
Weiss, Michael
, and
Hassan Hassan
.
ISIS. Inside the Army of Terror
. New York: Regan Arts, 2015.
Google Scholar
RTF
EndNote XML
Weiss, Michael
, and
Hassan Hassan
.
ISIS: Inside the Army of Terror
. New York: Simon & Schuster, 2015.
Google Scholar
RTF
EndNote XML
Cronin, Audrey Kurth
.
"
ISIS Is Not a Terrorist Group: Why Counterterrorism Won’t Stop the Latest Jihadist Threat
."
Foreign Affairs
(2015).
Google Scholar
RTF
EndNote XML
Gilsinan, Kathy
.
Is ISIS’s Social-Media Power Exaggerated?
. The Atlantic, 2015.
Google Scholar
RTF
EndNote XML
Stern, Jessica
, and
J.M. Berger
.
ISIS: The State of Terror
. New York: HarperCollins, 2015.
Google Scholar
RTF
EndNote XML
Meir Amit Intelligence and Terrorism Information Center
.
ISIS Updates Security Tips to Operatives Traveling to Syria
. American Center for Democracy, 2015.
Google Scholar
RTF
EndNote XML
Brown, Bill
.
Isla Vista Mass Murder, May 23, 2014, Investigative Summary
In
18 February 2015
. Santa Barbara, CA: Santa Barbara County Sheriff’s Office, 2015.
Google Scholar
RTF
EndNote XML
Masi, Alessandria
.
"
Islamic State ‘Caliphate’ in Libya Depends on Tunisian Foreign Fighters and Desert Training Camps
."
International Business Times
(2015).
Google Scholar
RTF
EndNote XML
Borschevskaya, Anna
.
"
The Islamic State Comes to Russia
."
Journal of International Security Affairs
(2015): 27-32.
Google Scholar
RTF
EndNote XML
Islamic State threat to Russia is real – FSB
. RT, 2015.
Google Scholar
RTF
EndNote XML
Atwan, Abdel Bari
.
Islamic State − the Digital Caliphate
. London: Saqi Books, 2015.
Google Scholar
RTF
EndNote XML
Bruggeman, Willy
,
Marleen Easton
, and
Philippe De Baets
.
"
It’s the Economy’ of Hoe Financiële Imperatieven Het Politie – En Veiligheidsbeleid Meer Dan Ooit Bepalen
."
Orde van de Dag: Criminaliteit En Samenleving
71 (2015): 15-18.
Google Scholar
RTF
EndNote XML
Italian National Police
., 2015.
Google Scholar
RTF
EndNote XML
Buriro, Attaullah
,
Bruno Crispo
,
Filippo Del Frari
,
Jeffrey Klardie
, and
Konrad Wrona
.
"
ITSME: Multi-modal and Unobtrusive Behavioural User Authentication for Smartphones
." In
Technology and Practice of Passwords, Lecture Notes in Computer Science
, 45-61. Vol. 9551. Cham: Springer, 2015.
DOI
Google Scholar
RTF
EndNote XML
ITU Statistics
., 2015.
Google Scholar
RTF
EndNote XML
ITU-T Work Programme
., 2015.
Google Scholar
RTF
EndNote XML
Jacenjuk ne vojuvav u Chechni, istorija Bastrykina ne shodytsja – uchasnyk pershoi chechenskoi vijny
. Radio Svoboda, 2015.
Google Scholar
RTF
EndNote XML
"
Jaïr van der Lijn, Comprehensive approaches, diverse coherences: the different levels of policy coherence in the Dutch 3D approach in Afghanistan
."
Small Wars & Insurgencies
26, no. 1 (2015): 72-89.
Google Scholar
RTF
EndNote XML
Sparrow, Andrew
.
Jean-Claude Juncker calls for EU Army
. The Guardian online, 2015.
Google Scholar
RTF
EndNote XML
Akkoc, Raziye
, and
Barney Henderson
.
Jihadi John identified: What we know about Mohammed Emwazi
. The Telegraph, 2015.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
203
204
205
206
207
208
209
210
211
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance