Skip to main content

CSDM Logo

Information Techologies for Security

JTSAC logo

  • IT for Security
  • Team
    • Researchers
    • Associates
    • Support Staff
    • PHD Students
  • Projects
    • Ongoing
    • Upcoming
    • Finalized
  • Courses
    • Defence policy
    • Security Studies
    • Cybersecurity
    • Administration
    • Management
    • Economics
    • Innovations
    • Themes
    • all courses
  • Resources
    • Publications
    • IT4Sec Reports
    • CSDM Views
    • Presentations
    • Books
  • Events
  • Partners
  • Contact

You are here

Home»Simulation and Training»CAX

CAX

CAX

Computer assisted exercises

Best Practice for Cybersecurity Capacity Building in Bulgaria’s Public Sector

Nikolova, Irena. "Best Practice for Cybersecurity Capacity Building in Bulgaria’s Public Sector." Information & Security: An International Journal 38 (2017): 79-92.
3806_Cybersecurity Capacity Building — Downloaded 6495 times
  • Read more about Best Practice for Cybersecurity Capacity Building in Bulgaria’s Public Sector
  • 14927 reads
  • Google Scholar(link is external)
  • DOI(link is external)
  • RTF
  • EndNote XML
  • English
  • Български
  • Facebook icon
  • Twitter icon
  • LinkedIn icon

Search form

Resources

  • Security policy
  • Cybersecurity
  • Intelligence
  • Law Enforcement
  • Terrorism
  • Operations
  • Technologies & Industry
  • Personnel management
  • Acquisition Management
  • Strategy
  • Concepts and doctrine
  • Management
  • Defence economics
  • Financial management
  • Information & knowledge management
  • Simulation and Training
    • Theoretical advances
    • Table top exercises
    • CAX
    • Modelling
    • Simulations
  • Change management
  • Decision-making
  • Good governance

Partner sites

Information & Security: An International JournalSecurity & Defence Mangement siteConnectins: The Quarterly Journal

IT4Sec News

Cybersecurity Threats and Challenges. International Best Practices

read more >>

Conference on Cybersecurity and Resilience

read more >>

Study on 2035 scenarios on defence resource allocation

read more >>

Contribution to the Inter-Parliamentary Conference on CFSP and CSDP

read more >>

Vol. 29 of I&S on Scenario-based Security Foresight is available online

read more >>
view all

  

 Trade mark of IIKT bas-logo

© IT for Security Department, Institute of ICT(link is external), 2010 -