Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
You are here
Home
»
Terrorism
Terrorism
Challenges of Intelligence Sharing in Combating Terrorism: An Academic Point of View
Dengg, Anton
.
"
Challenges of Intelligence Sharing in Combating Terrorism: An Academic Point of View
." In
The Dangerous Landscape
, 123-132., 2013.
Intelligence Sharing in Combating Terrorism
— Downloaded 8359 times
Read more
about Challenges of Intelligence Sharing in Combating Terrorism: An Academic Point of View
14405 reads
Google Scholar
RTF
EndNote XML
Violent Converts to Islam: Growing Cluster and Rising Trend
Arasli, Jahangir E.
.
"
Violent Converts to Islam: Growing Cluster and Rising Trend
." In
The Dangerous Landscape
, 99-121., 2013.
Violent Converts to Islam
— Downloaded 5867 times
Read more
about Violent Converts to Islam: Growing Cluster and Rising Trend
13752 reads
Google Scholar
RTF
EndNote XML
Foreword
Le Beau, John J.
.
"
Foreword
." In
The Dangerous Landscape
., 2013.
Read more
about Foreword
15132 reads
Google Scholar
RTF
EndNote XML
Islamic Extremism – Analyzing the Risks
Feiler, Michael
.
"
Islamic Extremism – Analyzing the Risks
." In
The Dangerous Landscape
, 87-97., 2013.
Islamic Extremism - Analyzing the Risks
— Downloaded 2906 times
Read more
about Islamic Extremism – Analyzing the Risks
13908 reads
Google Scholar
RTF
EndNote XML
Terrorist Innovation: Homegrown Terrorism and the Internet
Forster, Peter K.
.
"
Terrorist Innovation: Homegrown Terrorism and the Internet
." In
The Dangerous Landscape
, 79-86., 2013.
Terrorist Innovation: Homegrown Terrorism and the Internet
— Downloaded 2498 times
Read more
about Terrorist Innovation: Homegrown Terrorism and the Internet
12982 reads
Google Scholar
RTF
EndNote XML
After Bin Laden: Jihadist Terrorist Use of Strategic Communication to Enlarge the Community of Believers
Bockstette, Carsten
.
"
After Bin Laden: Jihadist Terrorist Use of Strategic Communication to Enlarge the Community of Believers
." In
The Dangerous Landscape
, 63-77., 2013.
Terrorist Use of Strategic Communication
— Downloaded 2620 times
Read more
about After Bin Laden: Jihadist Terrorist Use of Strategic Communication to Enlarge the Community of Believers
14845 reads
Google Scholar
RTF
EndNote XML
A Comprehensive Approach to Cyber Security –Trends, Challenges and the Way Forward
Perl, Raphael
, and
Nemanja Malisevic
.
"
A Comprehensive Approach to Cyber Security –Trends, Challenges and the Way Forward
." In
The Dangerous Landscape
, 47-61., 2013.
A Comprehensive Approach to Cyber Security
— Downloaded 5452 times
Read more
about A Comprehensive Approach to Cyber Security –Trends, Challenges and the Way Forward
16310 reads
Google Scholar
RTF
EndNote XML
Internet Forensics and Combating Terrorism
Antoliš, Krunoslav
.
"
Internet Forensics and Combating Terrorism
." In
The Dangerous Landscape
, 37-45., 2013.
Internet Forensics and Combating Terrorism
— Downloaded 4360 times
Read more
about Internet Forensics and Combating Terrorism
14172 reads
Google Scholar
RTF
EndNote XML
Disrupting Plots and Countering Ideology: Successes, Obstacles and Future Challenges for Intelligence Sharing in the United Kingdom
Gohel, Sajjan
.
"
Disrupting Plots and Countering Ideology: Successes, Obstacles and Future Challenges for Intelligence Sharing in the United Kingdom
." In
The Dangerous Landscape
, 19-36., 2013.
Disrupting Plots and Countering Ideology
— Downloaded 2544 times
Read more
about Disrupting Plots and Countering Ideology: Successes, Obstacles and Future Challenges for Intelligence Sharing in the United Kingdom
13654 reads
Google Scholar
RTF
EndNote XML
New Blood: The Recruitment of Terrorists
Le Beau, John J.
.
"
New Blood: The Recruitment of Terrorists
." In
The Dangerous Landscape
, 1-18., 2013.
New Blood: The Recruitment of Terrorists
— Downloaded 3149 times
Read more
about New Blood: The Recruitment of Terrorists
14542 reads
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance