Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
You are here
Home
»
Terrorism
Terrorism
Challenges of Intelligence Sharing in Combating Terrorism: An Academic Point of View
Dengg, Anton
.
"
Challenges of Intelligence Sharing in Combating Terrorism: An Academic Point of View
." In
The Dangerous Landscape
, 123-132., 2013.
Intelligence Sharing in Combating Terrorism
— Downloaded 8006 times
Read more
about Challenges of Intelligence Sharing in Combating Terrorism: An Academic Point of View
14075 reads
Google Scholar
RTF
EndNote XML
Violent Converts to Islam: Growing Cluster and Rising Trend
Arasli, Jahangir E.
.
"
Violent Converts to Islam: Growing Cluster and Rising Trend
." In
The Dangerous Landscape
, 99-121., 2013.
Violent Converts to Islam
— Downloaded 5620 times
Read more
about Violent Converts to Islam: Growing Cluster and Rising Trend
13423 reads
Google Scholar
RTF
EndNote XML
Foreword
Le Beau, John J.
.
"
Foreword
." In
The Dangerous Landscape
., 2013.
Read more
about Foreword
14762 reads
Google Scholar
RTF
EndNote XML
Islamic Extremism – Analyzing the Risks
Feiler, Michael
.
"
Islamic Extremism – Analyzing the Risks
." In
The Dangerous Landscape
, 87-97., 2013.
Islamic Extremism - Analyzing the Risks
— Downloaded 2747 times
Read more
about Islamic Extremism – Analyzing the Risks
13627 reads
Google Scholar
RTF
EndNote XML
Terrorist Innovation: Homegrown Terrorism and the Internet
Forster, Peter K.
.
"
Terrorist Innovation: Homegrown Terrorism and the Internet
." In
The Dangerous Landscape
, 79-86., 2013.
Terrorist Innovation: Homegrown Terrorism and the Internet
— Downloaded 2314 times
Read more
about Terrorist Innovation: Homegrown Terrorism and the Internet
12705 reads
Google Scholar
RTF
EndNote XML
After Bin Laden: Jihadist Terrorist Use of Strategic Communication to Enlarge the Community of Believers
Bockstette, Carsten
.
"
After Bin Laden: Jihadist Terrorist Use of Strategic Communication to Enlarge the Community of Believers
." In
The Dangerous Landscape
, 63-77., 2013.
Terrorist Use of Strategic Communication
— Downloaded 2369 times
Read more
about After Bin Laden: Jihadist Terrorist Use of Strategic Communication to Enlarge the Community of Believers
14440 reads
Google Scholar
RTF
EndNote XML
A Comprehensive Approach to Cyber Security –Trends, Challenges and the Way Forward
Perl, Raphael
, and
Nemanja Malisevic
.
"
A Comprehensive Approach to Cyber Security –Trends, Challenges and the Way Forward
." In
The Dangerous Landscape
, 47-61., 2013.
A Comprehensive Approach to Cyber Security
— Downloaded 5132 times
Read more
about A Comprehensive Approach to Cyber Security –Trends, Challenges and the Way Forward
15981 reads
Google Scholar
RTF
EndNote XML
Internet Forensics and Combating Terrorism
Antoliš, Krunoslav
.
"
Internet Forensics and Combating Terrorism
." In
The Dangerous Landscape
, 37-45., 2013.
Internet Forensics and Combating Terrorism
— Downloaded 4087 times
Read more
about Internet Forensics and Combating Terrorism
13900 reads
Google Scholar
RTF
EndNote XML
Disrupting Plots and Countering Ideology: Successes, Obstacles and Future Challenges for Intelligence Sharing in the United Kingdom
Gohel, Sajjan
.
"
Disrupting Plots and Countering Ideology: Successes, Obstacles and Future Challenges for Intelligence Sharing in the United Kingdom
." In
The Dangerous Landscape
, 19-36., 2013.
Disrupting Plots and Countering Ideology
— Downloaded 2339 times
Read more
about Disrupting Plots and Countering Ideology: Successes, Obstacles and Future Challenges for Intelligence Sharing in the United Kingdom
13341 reads
Google Scholar
RTF
EndNote XML
New Blood: The Recruitment of Terrorists
Le Beau, John J.
.
"
New Blood: The Recruitment of Terrorists
." In
The Dangerous Landscape
, 1-18., 2013.
New Blood: The Recruitment of Terrorists
— Downloaded 2944 times
Read more
about New Blood: The Recruitment of Terrorists
14245 reads
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance