Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
You are here
Home
»
Concepts and doctrine
»
Comprehensive Approach
Comprehensive Approach
Comprehensive Approach
Comprehensive Approach to Crisis Management, 3D approach, Whole-of-Government
Fostering a Comprehensive Security Approach: An Exploratory Case Study of CBRN Crisis Management Frameworks in Eleven European Countries
Bonfanti, Matteo E.
, and
Francesca Capone
.
"
Fostering a Comprehensive Security Approach: An Exploratory Case Study of CBRN Crisis Management Frameworks in Eleven European Countries
."
Information & Security: An International Journal
33, no. 1 (2015): 55-80.
Comprehensive Security: CBRN Crisis Management in Eleven European Countries
— Downloaded 6455 times
Read more
about Fostering a Comprehensive Security Approach: An Exploratory Case Study of CBRN Crisis Management Frameworks in Eleven European Countries
18084 reads
Google Scholar
DOI
RTF
EndNote XML
Comprehensive Security and Some Implemental Limits
Prezelj, Iztok
.
"
Comprehensive Security and Some Implemental Limits
."
Information & Security: An International Journal
33, no. 1 (2015): 13-34.
Prezelj_Comprehensive Security and Some Implemental Limits
— Downloaded 6833 times
Read more
about Comprehensive Security and Some Implemental Limits
18657 reads
Google Scholar
DOI
RTF
EndNote XML
Assessing Comprehensive Security Approaches in Action: An Introduction
Sweijs, Tim
, and
Milos Jovanovic
.
"
Assessing Comprehensive Security Approaches in Action: An Introduction
."
Information & Security: An International Journal
33, no. 1 (2015): 5-9.
Assessing Comprehensive Security Approaches in Action
— Downloaded 4617 times
Read more
about Assessing Comprehensive Security Approaches in Action: An Introduction
16585 reads
Google Scholar
DOI
RTF
EndNote XML
A Taxonomy of Essential Services
Tagarev, Todor
,
Venelin Georgiev
, and
Valeri Ratchev
.
"
A Taxonomy of Essential Services
."
Radioelectronic and Computer Systems
, no. 58 (2012): 191-196.
A Taxonomy of Essential Services
— Downloaded 4211 times
Read more
about A Taxonomy of Essential Services
13113 reads
Google Scholar
RTF
EndNote XML
A Comprehensive Approach to Modern Conflict: Afghanistan and Beyond
Crawshaw, Mike
,
John Rose
,
Martin Erdmann
,
Robert Loftis
,
James Soligan
,
Eric Edelman
, and
Hikmet Ç. etin
.
"
A Comprehensive Approach to Modern Conflict: Afghanistan and Beyond
."
Connections: The Quarterly Journal
6, no. 2 (2007): 1-66.
06.2.01_crawshaw.pdf
— Downloaded 6655 times
Read more
about A Comprehensive Approach to Modern Conflict: Afghanistan and Beyond
16975 reads
Google Scholar
DOI
RTF
EndNote XML
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Methodologies
Comprehensive Approach
Concepts of Operations
Military Doctrine
Command and Control
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance