Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21404 results:
RTF
EndNote XML
2013
Law on the State Budget of the Republic of Bulgaria for 2014
. State Gazette 109 (20 December 2013), 2013.
Google Scholar
RTF
EndNote XML
Ventre, Daniel
.
"
Le rapport Mandiant et la perception américaine de la menace chinoise
."
Dans Sécurité globale
1, no. 23 (2013): 53-64.
Google Scholar
RTF
EndNote XML
Cuijpers, C.M.K.C.
.
"
Legal Aspects of Open Source Intelligence – Results of the VIRTUOSO Project
."
Computer Law & Security Review 29, no. 6
29, no. 6 (2013): 642-653.
Google Scholar
RTF
EndNote XML
Shane, Scott
, and
Nicole Perlroth
.
"
Legislation seeks to bar NSA tactic in encryption
."
New York Times
(2013).
Google Scholar
RTF
EndNote XML
Lukyanov, Fedor
.
"
Let it be … how it used to be
."
Ogonek
(2013).
Google Scholar
RTF
EndNote XML
Letter from the Secretary-General addressed to the President of the Security Council
., 2013.
Google Scholar
RTF
EndNote XML
Letter from the Secretary-General addressed to the President of the Security Council
., 2013.
Google Scholar
RTF
EndNote XML
Letter from the Secretary-General addressed to the President of the Security Council on the appointment of Ms. Sigrid Kaag, Special Coordinator, OPCW/UN Joint Mission
., 2013.
Google Scholar
RTF
EndNote XML
Clarke, Richard A.
,
Michael J. Morell
,
Geoffrey R. Stone
,
Cass R. Sunstein
, and
Peter Swire
.
"
Liberty and Security in a Changing World
."
Report and Recommendations of The President’s Review Group on Intelligence and Communications Technologies
(2013): 81.
Google Scholar
RTF
EndNote XML
Orlov, Vladimir
, and
Alexander Cheban
.
"
Life after Death: Will the Nunn-Lugar Program Give Way to New Partnership?
"
Russia in Global Affairs
(2013).
Google Scholar
RTF
EndNote XML
Duvold, Kjetil
, and
Mindaugas Jurkynas
.
"
Lithuania
." In
Handbook of Political Change in Eastern Europe
, 125-166., 2013.
Google Scholar
RTF
EndNote XML
Live Blog: Syria crisis, UN chemical weapons team leaves Syria paving way for attack
. Haaretz, 2013.
Google Scholar
RTF
EndNote XML
Skoczylis, Joshua J.
.
The local prevention of terrorism in strategy and practice: ‘Contest’ a new era in the fight against terrorism
In
School of Law,
. Vol. PhD in Law. The University of Leeds, 2013.
Google Scholar
RTF
EndNote XML
Transformation, NATO Allied Com
.
Lock Your Shields and Brace for Impact
., 2013.
Google Scholar
RTF
EndNote XML
Bright, Peter
.
"
Locking the bad guys out with asymmetric encryption
."
Ars Technica
(2013).
Google Scholar
RTF
EndNote XML
Lone Mujahid Pocketbook
. Al-Malahem Media, 2013.
Google Scholar
RTF
EndNote XML
A Look at DEA Agent 'Kiki' Camarena's Murder
. Fox News You Tube Channel, 2013.
Google Scholar
RTF
EndNote XML
Ginty, Roger Mac
.
"
Look Who’s Talking, Dialogue and Conflict Transformation
."
Critical Studies on Terrorism
6, no. 1 (2013): 219.
Google Scholar
RTF
EndNote XML
"
Looking Forward: U.S. National Security Beyond the Wars
." In
Conference organized by the Center for a New American Security
, 56-63. Vol. 189 ., 2013.
Google Scholar
RTF
EndNote XML
Malta Police Force Organizational Chart
., 2013.
Google Scholar
RTF
EndNote XML
Niemiec, Marcin
, and
Andrzej R. Pach
.
"
Management of security in quantum cryptography
."
IEEE Communications Magazine
51, no. 8 (2013): 36-41.
Google Scholar
RTF
EndNote XML
Tagarev, Todor
.
Management Priorities of the Minister of Defence of the Republic of Bulgaria in the 2013 Caretaker Government
In
CSDM Views
. Sofia: Centre for Security and Defence Management, 2013.
DOI
Google Scholar
RTF
EndNote XML
Prima, Edit
,
Yudho G. Sucahyo
, and
Zainal A. Hasibuan
.
"
Mapping the certification authority for e-government procurement system into eGovAMAN framework
." In
International Conference on Advanced Computer Science and Information Systems (ICACSIS)
. Bali, Indonesia: IEEE, 2013.
Google Scholar
RTF
EndNote XML
Oppel, Richard
, and
Jess Bidgood
.
"
Marathon Bombing Suspect, in First Court Appearance, Pleads Not Guilty
."
The New York Times
(2013).
Google Scholar
RTF
EndNote XML
Zemmari, Reda
,
Martina Daun
,
Michael Feldmann
, and
Ulrich Nickel
.
"
Maritime Surveillance with GSM Passive Radar: Detection and Tracking of Small Agile Targets
." In
14th International Radar Symposium
. Dresden, Germany, 2013.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
299
300
301
302
303
304
305
306
307
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance