Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
You are here
Home
»
Terrorism
Terrorism
Challenges of Intelligence Sharing in Combating Terrorism: An Academic Point of View
Dengg, Anton
.
"
Challenges of Intelligence Sharing in Combating Terrorism: An Academic Point of View
." In
The Dangerous Landscape
, 123-132., 2013.
Intelligence Sharing in Combating Terrorism
— Downloaded 8232 times
Read more
about Challenges of Intelligence Sharing in Combating Terrorism: An Academic Point of View
14282 reads
Google Scholar
RTF
EndNote XML
Violent Converts to Islam: Growing Cluster and Rising Trend
Arasli, Jahangir E.
.
"
Violent Converts to Islam: Growing Cluster and Rising Trend
." In
The Dangerous Landscape
, 99-121., 2013.
Violent Converts to Islam
— Downloaded 5785 times
Read more
about Violent Converts to Islam: Growing Cluster and Rising Trend
13635 reads
Google Scholar
RTF
EndNote XML
Foreword
Le Beau, John J.
.
"
Foreword
." In
The Dangerous Landscape
., 2013.
Read more
about Foreword
14992 reads
Google Scholar
RTF
EndNote XML
Islamic Extremism – Analyzing the Risks
Feiler, Michael
.
"
Islamic Extremism – Analyzing the Risks
." In
The Dangerous Landscape
, 87-97., 2013.
Islamic Extremism - Analyzing the Risks
— Downloaded 2844 times
Read more
about Islamic Extremism – Analyzing the Risks
13787 reads
Google Scholar
RTF
EndNote XML
Terrorist Innovation: Homegrown Terrorism and the Internet
Forster, Peter K.
.
"
Terrorist Innovation: Homegrown Terrorism and the Internet
." In
The Dangerous Landscape
, 79-86., 2013.
Terrorist Innovation: Homegrown Terrorism and the Internet
— Downloaded 2431 times
Read more
about Terrorist Innovation: Homegrown Terrorism and the Internet
12885 reads
Google Scholar
RTF
EndNote XML
After Bin Laden: Jihadist Terrorist Use of Strategic Communication to Enlarge the Community of Believers
Bockstette, Carsten
.
"
After Bin Laden: Jihadist Terrorist Use of Strategic Communication to Enlarge the Community of Believers
." In
The Dangerous Landscape
, 63-77., 2013.
Terrorist Use of Strategic Communication
— Downloaded 2547 times
Read more
about After Bin Laden: Jihadist Terrorist Use of Strategic Communication to Enlarge the Community of Believers
14713 reads
Google Scholar
RTF
EndNote XML
A Comprehensive Approach to Cyber Security –Trends, Challenges and the Way Forward
Perl, Raphael
, and
Nemanja Malisevic
.
"
A Comprehensive Approach to Cyber Security –Trends, Challenges and the Way Forward
." In
The Dangerous Landscape
, 47-61., 2013.
A Comprehensive Approach to Cyber Security
— Downloaded 5328 times
Read more
about A Comprehensive Approach to Cyber Security –Trends, Challenges and the Way Forward
16183 reads
Google Scholar
RTF
EndNote XML
Internet Forensics and Combating Terrorism
Antoliš, Krunoslav
.
"
Internet Forensics and Combating Terrorism
." In
The Dangerous Landscape
, 37-45., 2013.
Internet Forensics and Combating Terrorism
— Downloaded 4272 times
Read more
about Internet Forensics and Combating Terrorism
14069 reads
Google Scholar
RTF
EndNote XML
Disrupting Plots and Countering Ideology: Successes, Obstacles and Future Challenges for Intelligence Sharing in the United Kingdom
Gohel, Sajjan
.
"
Disrupting Plots and Countering Ideology: Successes, Obstacles and Future Challenges for Intelligence Sharing in the United Kingdom
." In
The Dangerous Landscape
, 19-36., 2013.
Disrupting Plots and Countering Ideology
— Downloaded 2483 times
Read more
about Disrupting Plots and Countering Ideology: Successes, Obstacles and Future Challenges for Intelligence Sharing in the United Kingdom
13561 reads
Google Scholar
RTF
EndNote XML
New Blood: The Recruitment of Terrorists
Le Beau, John J.
.
"
New Blood: The Recruitment of Terrorists
." In
The Dangerous Landscape
, 1-18., 2013.
New Blood: The Recruitment of Terrorists
— Downloaded 3077 times
Read more
about New Blood: The Recruitment of Terrorists
14438 reads
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance