Skip to main content

CSDM Logo

Information Techologies for Security

JTSAC logo

  • IT for Security
  • Team
    • Researchers
    • Associates
    • Support Staff
    • PHD Students
  • Projects
    • Ongoing
    • Upcoming
    • Finalized
  • Courses
    • Defence policy
    • Security Studies
    • Cybersecurity
    • Administration
    • Management
    • Economics
    • Innovations
    • Themes
    • all courses
  • Resources
    • Publications
    • IT4Sec Reports
    • CSDM Views
    • Presentations
    • Books
  • Events
  • Partners
  • Contact

Biblio

Export 12 results:
  • RTF
  • EndNote XML
Filters: Author is ENISA  [Clear All Filters]
2021
ENISA. CSIRT Maturity - Self-assessment Tool., 2021.
  • Google Scholar
  • RTF
  • EndNote XML
ENISA. NCSS: Practical Guide on Development and Execution., 2021.
  • Google Scholar
  • RTF
  • EndNote XML
2020
ENISA. CSIRT Maturity – Self-assessment Tool., 2020.
  • Google Scholar
  • RTF
  • EndNote XML
ENISA. Guidelines for Securing the Internet of Things., 2020.
  • Google Scholar
  • RTF
  • EndNote XML
2017
ENISA. Public Private Partnerships (PPP) – Cooperative Models., 2017.
  • DOI
  • Google Scholar
  • RTF
  • EndNote XML
ENISA. Threat-Landscape-Report 2017. Heraklion: European Union Agency for Network and Information Security, 2017.
  • Google Scholar
  • RTF
  • EndNote XML
2015
ENISA. National Cyber Security Strategies in the World., 2015.
  • Google Scholar
  • RTF
  • EndNote XML
2014
ENISA. ENISA Threat Landscape 2014: Overview of current and emerging cyber-threats., 2014.
  • Google Scholar
  • RTF
  • EndNote XML
2013
ENISA. Position Paper of the EP3R Task Forces on Trusted Information Sharing (TF-TIS). European Union Agency for Network and Information Security, 2013.
  • Google Scholar
  • RTF
  • EndNote XML
2012
ENISA. Proactive Detection of Security Incidents - Honeypots., 2012.
  • Google Scholar
  • RTF
  • EndNote XML
2011
ENISA. Critical Infrastructures and Services: Maritime., 2011.
  • Google Scholar
  • RTF
  • EndNote XML
2009
ENISA. Good Practice Guide – Network Security Information Exchanges., 2009.
  • Google Scholar
  • RTF
  • EndNote XML
  • English
  • Български
  • Facebook icon
  • Twitter icon
  • LinkedIn icon

Search form

Resources

  • Security policy
  • Cybersecurity
  • Intelligence
  • Law Enforcement
  • Terrorism
  • Operations
  • Technologies & Industry
  • Personnel management
  • Acquisition Management
  • Strategy
  • Concepts and doctrine
  • Management
  • Defence economics
  • Financial management
  • Information & knowledge management
  • Simulation and Training
  • Change management
  • Decision-making
  • Good governance

Partner sites

Information & Security: An International JournalSecurity & Defence Mangement siteConnectins: The Quarterly Journal

IT4Sec News

The first publication to reach 500 downloads

read more >>

Scientific session for the anniversary of "IT for Security"

read more >>

Dr. Tagarev discussed research cooperation with the Taras Shevchenko National University of Kyiv

read more >>

TV interview on the forthcoming NATO summit

read more >>

Driver+ Trial 1

read more >>
view all

  

 Trade mark of IIKT bas-logo

© IT for Security Department, Institute of ICT, 2010 -