Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
You are here
Home
»
Security policy
»
Security Environment
Security Environment
Security Environment
General description of security environment, comparative analysis, trends, data
Containing Kosovo
Bardos, Gordon N.
.
"
Containing Kosovo
."
Connections: The Quarterly Journal
3, no. 4 (2004): 21-33.
03.4.03_bardos.pdf
— Downloaded 8014 times
Read more
about Containing Kosovo
22480 reads
Google Scholar
DOI
RTF
EndNote XML
Terrorism Transformed: The “New Terrorism,” Impact Scalability, and the Dynamic of Reciprocal Threat Perception
Zimmermann, Doron
.
"
Terrorism Transformed: The “New Terrorism,” Impact Scalability, and the Dynamic of Reciprocal Threat Perception
."
Connections: The Quarterly Journal
3, no. 1 (2004): 19-39.
03.1.03_zimmermann.pdf
— Downloaded 8791 times
Read more
about Terrorism Transformed: The “New Terrorism,” Impact Scalability, and the Dynamic of Reciprocal Threat Perception
22300 reads
Google Scholar
DOI
RTF
EndNote XML
Pages
« first
‹ previous
1
2
English
Български
Search form
Search
Resources
Security policy
Theory
Security Environment
Foreign policy
Defence policy
Internal Security Policy
Civil & Societal Security
Critical Infrastructure Protection
Human Security
Resilience
Emerging Security Challenges
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance