Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
You are here
Home
»
Terrorism
Terrorism
Challenges of Intelligence Sharing in Combating Terrorism: An Academic Point of View
Dengg, Anton
.
"
Challenges of Intelligence Sharing in Combating Terrorism: An Academic Point of View
." In
The Dangerous Landscape
, 123-132., 2013.
Intelligence Sharing in Combating Terrorism
— Downloaded 8602 times
Read more
about Challenges of Intelligence Sharing in Combating Terrorism: An Academic Point of View
14565 reads
Google Scholar
RTF
EndNote XML
Violent Converts to Islam: Growing Cluster and Rising Trend
Arasli, Jahangir E.
.
"
Violent Converts to Islam: Growing Cluster and Rising Trend
." In
The Dangerous Landscape
, 99-121., 2013.
Violent Converts to Islam
— Downloaded 6090 times
Read more
about Violent Converts to Islam: Growing Cluster and Rising Trend
13912 reads
Google Scholar
RTF
EndNote XML
Foreword
Le Beau, John J.
.
"
Foreword
." In
The Dangerous Landscape
., 2013.
Read more
about Foreword
15323 reads
Google Scholar
RTF
EndNote XML
Islamic Extremism – Analyzing the Risks
Feiler, Michael
.
"
Islamic Extremism – Analyzing the Risks
." In
The Dangerous Landscape
, 87-97., 2013.
Islamic Extremism - Analyzing the Risks
— Downloaded 3043 times
Read more
about Islamic Extremism – Analyzing the Risks
14018 reads
Google Scholar
RTF
EndNote XML
Terrorist Innovation: Homegrown Terrorism and the Internet
Forster, Peter K.
.
"
Terrorist Innovation: Homegrown Terrorism and the Internet
." In
The Dangerous Landscape
, 79-86., 2013.
Terrorist Innovation: Homegrown Terrorism and the Internet
— Downloaded 2649 times
Read more
about Terrorist Innovation: Homegrown Terrorism and the Internet
13124 reads
Google Scholar
RTF
EndNote XML
After Bin Laden: Jihadist Terrorist Use of Strategic Communication to Enlarge the Community of Believers
Bockstette, Carsten
.
"
After Bin Laden: Jihadist Terrorist Use of Strategic Communication to Enlarge the Community of Believers
." In
The Dangerous Landscape
, 63-77., 2013.
Terrorist Use of Strategic Communication
— Downloaded 2755 times
Read more
about After Bin Laden: Jihadist Terrorist Use of Strategic Communication to Enlarge the Community of Believers
14991 reads
Google Scholar
RTF
EndNote XML
A Comprehensive Approach to Cyber Security –Trends, Challenges and the Way Forward
Perl, Raphael
, and
Nemanja Malisevic
.
"
A Comprehensive Approach to Cyber Security –Trends, Challenges and the Way Forward
." In
The Dangerous Landscape
, 47-61., 2013.
A Comprehensive Approach to Cyber Security
— Downloaded 5705 times
Read more
about A Comprehensive Approach to Cyber Security –Trends, Challenges and the Way Forward
16451 reads
Google Scholar
RTF
EndNote XML
Internet Forensics and Combating Terrorism
Antoliš, Krunoslav
.
"
Internet Forensics and Combating Terrorism
." In
The Dangerous Landscape
, 37-45., 2013.
Internet Forensics and Combating Terrorism
— Downloaded 4529 times
Read more
about Internet Forensics and Combating Terrorism
14306 reads
Google Scholar
RTF
EndNote XML
Disrupting Plots and Countering Ideology: Successes, Obstacles and Future Challenges for Intelligence Sharing in the United Kingdom
Gohel, Sajjan
.
"
Disrupting Plots and Countering Ideology: Successes, Obstacles and Future Challenges for Intelligence Sharing in the United Kingdom
." In
The Dangerous Landscape
, 19-36., 2013.
Disrupting Plots and Countering Ideology
— Downloaded 2679 times
Read more
about Disrupting Plots and Countering Ideology: Successes, Obstacles and Future Challenges for Intelligence Sharing in the United Kingdom
13786 reads
Google Scholar
RTF
EndNote XML
New Blood: The Recruitment of Terrorists
Le Beau, John J.
.
"
New Blood: The Recruitment of Terrorists
." In
The Dangerous Landscape
, 1-18., 2013.
New Blood: The Recruitment of Terrorists
— Downloaded 3272 times
Read more
about New Blood: The Recruitment of Terrorists
14692 reads
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance