Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21404 results:
RTF
EndNote XML
2013
Bockstette, Carsten
.
"
After Bin Laden: Jihadist Terrorist Use of Strategic Communication to Enlarge the Community of Believers
." In
The Dangerous Landscape
, 63-77., 2013.
Google Scholar
RTF
EndNote XML
Barry, Ellen
.
"
After Boston Bombing, American Ties with Russia Improve
."
New York Times
(2013).
Google Scholar
RTF
EndNote XML
Rukavishnikov, Vladimir
.
"
Ageing Russia, possibilities of substantial revolutionary changes and youth-related problems
."
Medjunarodni problemi
65, no. 3 (2013): 295-314.
DOI
Google Scholar
RTF
EndNote XML
Timberg, Craig
, and
Ellen Nakashima
.
"
Agreement with private companies protect US access to cables’ data for surveillance
."
Washington Post
(2013).
Google Scholar
RTF
EndNote XML
Etzioni, Amitai
.
Air-Sea Battle: A Dangerous Way to Deal with China
. The Diplomat, 2013.
Google Scholar
RTF
EndNote XML
Lake, Eli
.
"
Al Qaeda’s Recipe for Pressure-Cooker Bombs
."
The Daily Beast
(2013).
Google Scholar
RTF
EndNote XML
Albanian HFA Monitoring Report 2011-2013
., 2013.
Google Scholar
RTF
EndNote XML
Gupta, Sandeep
,
BS Dhaliwal
, and
Rahul Malhotra
.
"
All-Embracing Review Of Wireless Network Protocol, Optimum Network Simulator
."
International Journal of Computer & Organization Trends
3, no. 3 (2013).
Google Scholar
RTF
EndNote XML
Lewis, Jessica
.
Al-Qaeda in Iraq Resurgent: the Breaking the Walls Campaign
. Washington DC: Institute for the Study of War, 2013.
Google Scholar
RTF
EndNote XML
Smith, Jonathan
.
"
Amateur Hour? Experience and Faculty Qualifications in U.S. Intelligence Courses
."
Journal of Strategic Security
6, no. 3 (2013).
Google Scholar
RTF
EndNote XML
Füle, Štefan
.
Ambitions of EU and East Partners for the Vilnius Summit
In
Press Releases Rapid
., 2013.
Google Scholar
RTF
EndNote XML
Foster, Peter
, and
Raf Sanchez
.
America Is ‘Livid’ with the British and Could Launch Syria Strikes on its own
In
Business Insider
., 2013.
Google Scholar
RTF
EndNote XML
Matsumoto, Masakazu
.
"
The American just war theory in the 21st century: continuity or renewal?
"
Protestantismo em Revista
10 (2013): 11-31.
Google Scholar
RTF
EndNote XML
Gross, Eva
.
The American Sequester and Us
. European Union Institute for Security Studies, 2013.
Google Scholar
RTF
EndNote XML
Rana, Nripendra P.
,
Yogesh K. Dwivedi
, and
Michael D. Williams
.
"
Analysing challenges, barriers and CSF of egov adoption
."
Transforming Government People Process and Policy
7, no. 2 (2013).
Google Scholar
RTF
EndNote XML
Parsons, Kathryn
,
Agata McCormac
,
Malcolm Pattinson
,
Marcus Butavicius
, and
Cate Jerram
.
An Analysis of Information Security Vulnerabilities at Three Australian Government Organisations
In
Proceedings of theEuropean Information Security Multi-Conference (EISMC 2013)
., 2013.
Google Scholar
RTF
EndNote XML
Conková, Monika
.
"
Analysis of Perceptions of Conventional and E-Learning Education in Corporate Training
."
Journal of Competitiveness
5, no. 4 (2013).
Google Scholar
RTF
EndNote XML
Genchev, Anguel D.
.
Analysis of Virtualization Systems in Cloud Architecture Design
In
MT&S-2013,
. Sofia, Bulgaria: Defence Institute, 2013.
Google Scholar
RTF
EndNote XML
Tagarev, Todor
, and
Petya Ivanova
.
"
Analytical support to foresighting EU roles as a Global Security Actor
."
Information & Security: An International Journal
29, no. 1 (2013): 21-33.
DOI
Google Scholar
RTF
EndNote XML
Kaplan, Robert D.
.
Anarchy and Hegemony
. Stratfor, 2013.
Google Scholar
RTF
EndNote XML
Annual Report 2013 on Radiation and Nuclear Safety in the Republic of Slovenia, Ministry of agriculture and the environment
. Slovenian nuclear safety administration, 2013.
Google Scholar
RTF
EndNote XML
Annual Report on the Protection of the Constitution. Summary
. Federal Ministry of the Interior, 2013.
Google Scholar
RTF
EndNote XML
Ungar, Michael
,
Mehdi Ghazinour
, and
Jörg Richter
.
"
Annual Research Review: What is Resilience within the Social Ecology of Human Development?
"
Journal of Child Psychology and Psychiatry
54, no. 4 (2013): 348-366.
DOI
Google Scholar
RTF
EndNote XML
Zhang, Yong Hua
.
"
Anonymity Query Method of Outsourced Database
."
Advanced Materials Research
798-799 (2013): 837-841.
Google Scholar
RTF
EndNote XML
Barnett, David
.
Ansar Jerusalem Announces Deaths of 3 Fighters, Including Commander
. Threat Matrix, 2013.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
278
279
280
281
282
283
284
285
286
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance