Skip to main content

CSDM Logo

Information Techologies for Security

JTSAC logo

  • IT for Security
  • Team
    • Researchers
    • Associates
    • Support Staff
    • PHD Students
  • Projects
    • Ongoing
    • Upcoming
    • Finalized
  • Courses
    • Defence policy
    • Security Studies
    • Cybersecurity
    • Administration
    • Management
    • Economics
    • Innovations
    • Themes
    • all courses
  • Resources
    • Publications
    • IT4Sec Reports
    • CSDM Views
    • Presentations
    • Books
  • Events
  • Partners
  • Contact

You are here

Home»Security policy»Security Environment

Security Environment

Security Environment

General description of security environment, comparative analysis, trends, data

Containing Kosovo

Bardos, Gordon N.. "Containing Kosovo." Connections: The Quarterly Journal 3, no. 4 (2004): 21-33.
03.4.03_bardos.pdf — Downloaded 8584 times
  • Read more about Containing Kosovo
  • 23346 reads
  • Google Scholar(link is external)
  • DOI(link is external)
  • RTF
  • EndNote XML

Terrorism Transformed: The “New Terrorism,” Impact Scalability, and the Dynamic of Reciprocal Threat Perception

Zimmermann, Doron. "Terrorism Transformed: The “New Terrorism,” Impact Scalability, and the Dynamic of Reciprocal Threat Perception." Connections: The Quarterly Journal 3, no. 1 (2004): 19-39.
03.1.03_zimmermann.pdf — Downloaded 9392 times
  • Read more about Terrorism Transformed: The “New Terrorism,” Impact Scalability, and the Dynamic of Reciprocal Threat Perception
  • 23578 reads
  • Google Scholar(link is external)
  • DOI(link is external)
  • RTF
  • EndNote XML

Pages

  • « first
  • ‹ previous
  • 1
  • 2
  • English
  • Български
  • Facebook icon
  • Twitter icon
  • LinkedIn icon

Search form

Resources

  • Security policy
    • Theory
    • Security Environment
    • Foreign policy
    • Defence policy
    • Internal Security Policy
    • Civil & Societal Security
    • Critical Infrastructure Protection
    • Human Security
    • Resilience
    • Emerging Security Challenges
  • Cybersecurity
  • Intelligence
  • Law Enforcement
  • Terrorism
  • Operations
  • Technologies & Industry
  • Personnel management
  • Acquisition Management
  • Strategy
  • Concepts and doctrine
  • Management
  • Defence economics
  • Financial management
  • Information & knowledge management
  • Simulation and Training
  • Change management
  • Decision-making
  • Good governance

Partner sites

Information & Security: An International JournalSecurity & Defence Mangement siteConnectins: The Quarterly Journal

IT4Sec News

The website of the DRIVER project is officially launched

read more >>

Driver+ reports now accessible online

read more >>

The first publication to reach 500 downloads

read more >>

Scientific session for the anniversary of "IT for Security"

read more >>

Dr. Tagarev discussed research cooperation with the Taras Shevchenko National University of Kyiv

read more >>
view all

  

 Trade mark of IIKT bas-logo

© IT for Security Department, Institute of ICT(link is external), 2010 -