Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
You are here
Home
»
Concepts and doctrine
»
Comprehensive Approach
Comprehensive Approach
Comprehensive Approach
Comprehensive Approach to Crisis Management, 3D approach, Whole-of-Government
Fostering a Comprehensive Security Approach: An Exploratory Case Study of CBRN Crisis Management Frameworks in Eleven European Countries
Bonfanti, Matteo E.
, and
Francesca Capone
.
"
Fostering a Comprehensive Security Approach: An Exploratory Case Study of CBRN Crisis Management Frameworks in Eleven European Countries
."
Information & Security: An International Journal
33, no. 1 (2015): 55-80.
Comprehensive Security: CBRN Crisis Management in Eleven European Countries
— Downloaded 6796 times
Read more
about Fostering a Comprehensive Security Approach: An Exploratory Case Study of CBRN Crisis Management Frameworks in Eleven European Countries
19276 reads
Google Scholar
(link is external)
DOI
(link is external)
RTF
EndNote XML
Comprehensive Security and Some Implemental Limits
Prezelj, Iztok
.
"
Comprehensive Security and Some Implemental Limits
."
Information & Security: An International Journal
33, no. 1 (2015): 13-34.
Prezelj_Comprehensive Security and Some Implemental Limits
— Downloaded 7302 times
Read more
about Comprehensive Security and Some Implemental Limits
20118 reads
Google Scholar
(link is external)
DOI
(link is external)
RTF
EndNote XML
Assessing Comprehensive Security Approaches in Action: An Introduction
Sweijs, Tim
, and
Milos Jovanovic
.
"
Assessing Comprehensive Security Approaches in Action: An Introduction
."
Information & Security: An International Journal
33, no. 1 (2015): 5-9.
Assessing Comprehensive Security Approaches in Action
— Downloaded 4892 times
Read more
about Assessing Comprehensive Security Approaches in Action: An Introduction
17495 reads
Google Scholar
(link is external)
DOI
(link is external)
RTF
EndNote XML
A Taxonomy of Essential Services
Tagarev, Todor
,
Venelin Georgiev
, and
Valeri Ratchev
.
"
A Taxonomy of Essential Services
."
Radioelectronic and Computer Systems
, no. 58 (2012): 191-196.
A Taxonomy of Essential Services
— Downloaded 4468 times
Read more
about A Taxonomy of Essential Services
13959 reads
Google Scholar
(link is external)
RTF
EndNote XML
A Comprehensive Approach to Modern Conflict: Afghanistan and Beyond
Crawshaw, Mike
,
John Rose
,
Martin Erdmann
,
Robert Loftis
,
James Soligan
,
Eric Edelman
, and
Hikmet Ç. etin
.
"
A Comprehensive Approach to Modern Conflict: Afghanistan and Beyond
."
Connections: The Quarterly Journal
6, no. 2 (2007): 1-66.
06.2.01_crawshaw.pdf
— Downloaded 7063 times
Read more
about A Comprehensive Approach to Modern Conflict: Afghanistan and Beyond
17941 reads
Google Scholar
(link is external)
DOI
(link is external)
RTF
EndNote XML
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Methodologies
Comprehensive Approach
Concepts of Operations
Military Doctrine
Command and Control
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance
Back to top