Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21393 results:
RTF
EndNote XML
2017
Sonderermittler soll Fall Amri aufklären
. Handelsblatt online, 2017.
Google Scholar
RTF
EndNote XML
Ismail, Mohamed
.
Sony Pictures and the U.S. Federal Government: A Case Study Analysis of the Sony Pictures Entertainment Hack Crisis Using Normal Accidents Theory
In
College of Arts and Letters, and the Department of Communication Studies
. Vol. Master of Arts. University of Southern Mississippi, 2017.
Google Scholar
RTF
EndNote XML
Jung, K.
.
"
Sources of Organizational Resilience for Sustainable Communities: An Institutional Collective Action Perspective
."
Sustainability
9, no. 7 (2017): 1141.
DOI
Google Scholar
RTF
EndNote XML
Nasirov, Elman
,
Khayal Iskandarov
, and
Sadi Sadiyev
.
"
The South Caucasus: A playground between NATO and Russia?
"
Connections: The Quarterly Journal
16, no. 3 (2017): 47-56.
DOI
Google Scholar
RTF
EndNote XML
South Korean Stereotypes towards North Koreans
In
On Our Way to Meet You
. Channel A, 2017.
Google Scholar
RTF
EndNote XML
Special Eurobarometer 432, Europeans’ Attitudes Towards Security
., 2017.
Google Scholar
RTF
EndNote XML
Fritchey, Grant
.
SQL Server 2017 Query Performance Tuning
In
Disk Performance Analysis
. Apress, 2017.
DOI
Google Scholar
RTF
EndNote XML
Bailey, Nick
.
St. Petersburg Subway Bomb: 5 Things to Know About Central Asia
. NBC News, 2017.
Google Scholar
RTF
EndNote XML
Smith, Paul Alan
.
"
Stakeholder Engagement Framework
."
Information & Security: An International Journal
38 (2017): 35-45.
DOI
Google Scholar
RTF
EndNote XML
The State Program for the Development of the Armed Forces of Ukraine until 2020
. Ministry of Defence of Ukraine, 2017.
Google Scholar
RTF
EndNote XML
Statistics of Casualties in North Caucasus for 7 years
. Kavkazsky Uzel [Caucasian Knot], 2017.
Google Scholar
RTF
EndNote XML
Kapanadze, Sergi
,
Ulrich Kühn
,
Wolfgang Richter
, and
Wolfgang Zellner
.
Status-Neutral Security, Confidence-Building and Arms Control Measures in the Georgian Context
In
Working Paper
. Hamburg: The Centre for OSCE Research (CORE), 2017.
Google Scholar
RTF
EndNote XML
Stipulations of the Antiterrorist Legislation, Constraining Citizen’s Rights (in Russian)
In
Monitoring New Russian Laws and Their Implementation in the Field of Civil Rights
., 2017.
Google Scholar
RTF
EndNote XML
Gauthier-Villars, David
, and
Drew Hinshaw
.
"
Stockholm Attack Puts Focus on Terrorists from Central Asia
."
The Wall Street Journal
(2017).
Google Scholar
RTF
EndNote XML
Stolberg, Alan
.
Strategic Plan for DEEP Ukraine (as of December 2016)
. EDWG, 2017.
Google Scholar
RTF
EndNote XML
Allen, Robert A.
, and
Gareth R. T. White
.
"
A Study of Attitudes Towards Threat in the United Kingdom Ministry of Defence Commercial Function
." In
British Academy of Management Conference
. University of Warwick , 2017.
Google Scholar
RTF
EndNote XML
Zarembo, Kateryna
.
"
Substituting for the State: The Role of Volunteers in Defense Reform in Post-Euromaidan Ukraine
."
Kyiv-Mohyla Law and Politics Journal
3 (2017): 47-70.
DOI
Google Scholar
RTF
EndNote XML
Lehto, Martti
, and
Jarno Limnéll
.
Suomen kyberturvallisuuden nykytila, tavoitetila ja tarvittavat toimenpiteet tavoitetilan saavuttamiseksi (Finland’s Cyber Security: The Present State, Vision and the Actions Needed to Achieve the Vision)
. Helsinki: Prime Min¬ister's Office, 2017.
Google Scholar
RTF
EndNote XML
Suomen kyberturvallisuusstrategian toimeenpano-ohjelma 2017-2020 (Implementation Programme for Finland’s Cyber Security Strategy for 2017-2020)
. Helsinki: The Security Committee, 2017.
Google Scholar
RTF
EndNote XML
Morsey, Christopher
.
Supervisory Control and Data Acquisition (SCADA) Systems and Cyber-Security: Best Practices to Secure Critical Infrastructure
. Robert Morris University, 2017.
Google Scholar
RTF
EndNote XML
Khoufi, Ines
,
Pascale Minet
,
Anis Laouiti
, and
Saoucene Mahfoudh
.
"
Survey of Deployment Algorithms in Wireless Sensor Networks: Coverage and Connectivity Issues and Challenges
."
International journal of autonomous and adaptive communications systems
10, no. 4 (2017): 341-390.
DOI
Google Scholar
RTF
EndNote XML
Kemp, Harry
.
The Survival of Small Businesses in Northeastern Florida After a Natural Disaster
In
Management
. Vol. Doctor of Business Administration (D.B.A.). Walden University, 2017.
Google Scholar
RTF
EndNote XML
Nyberg, Per
, and
James Masters
.
Sweden Terror Suspect ‘Confesses’ to Stockholm Attack
. CNN, 2017.
Google Scholar
RTF
EndNote XML
Gustafsson, Linus
, and
Magnus Ranstorp
.
Swedish Foreign Fighters in Syria and Iraq: An analysis of open-source intelligence and statistical data
. Swedish Defence University: Center for Asymmetric Threat Studies (CATS), 2017.
Google Scholar
RTF
EndNote XML
Eakin, Hugh
.
"
The Swedish Kings of Cyberwar
."
New York Review of Books
64, no. 1 (2017): 57.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
139
140
141
142
143
144
145
146
147
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance