Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
USD 39, 5 billion will be spent on Smart City Technologies in 2016
In
Press release by ABI Research
.
United NatE-Government. Survey 2012. E-Government for the People
. United Nations, 2012.
Website of the SafeCity project
., 2015.
Hunt, Steven
.
Physical security information management (PSIM): The basics
. CSO Online, 2010.
CCTV National Strategy
. UK Home Office, 2007.
Jolly, Richard
, and
Deepayan Basu Ray
.
The Human Security Framework and National Fuman Development Reports: A review of Еxperiences and Current Debates
In
National Human Development Report Series
. New York: The United Nations, 2006.
Booth, Ken
, and
Nicholas J. Wheeler
.
The Security Dilemma: Fear, Cooperation and Trust in World Politics
. New York: Palgrave Macmillan, 2008.
Alemika, Etannibi O.
, and
Innocent C. Chukwuma
.
"
Security, Criminalization and Criminal Victimization
." In
Crime Victimization, Safety and Policing in Nigeria
, 1-19. Lagos: Malthouse Press Limited, 2011.
Ikoh, Moses U.
, and
Ebebe A. Ukpong
.
"
The Niger Delta Crisis: Taming Violence Beyond Amnesty
."
International Journal of Humanities and Social Science
3, no. 17 (2003).
Constitution of Nigeria
., 1999.
Kiountouzis, Evangelos A.
, and
Spyros A. Kokolakis
.
"
An Analyst's View of Information Systems Security
." In
Information Systems Security: Facing the Information Society of the 21st Century
. London: Chapman & Hall, 1996.
Lambo, Taiye
.
"
ISO/IEC 27001: The Future of Infosec Certification
."
ISSA Journal
(2006).
Official Secrets Act
. Lagos: The Government Press, 1962.
Wawak, Slawomir
.
"
Information Security Management in Context of Globalization
."
Journal of the Washington Institute of China Studies
6, no. 1 (2012): 41-52.
Davis, Lynn E.
.
Globalization’s Security Implications
In
RAND Issue Paper
., 2003.
Karacasulu, Nilufer
.
"
Security and Globalization in the Context of International Terrorism
."
Review of International Law and Politics
2, no. 5 (2006): 1-17.
Ogbaro, P.
.
Nigeria’s Porous Border and Transnational Crime
. Lagos: Allman Press, 2003.
Ayissi, Anatole
, and
Ibahima Sall
.
Combating the Proliferation of Small Arms and Light Weapons in West Africa: Handbook for the Training of Armed and Security Forces
. United Nations Institute for Disarmament Research, 2005.
Uya, Okon Edet
.
Contemporary Nigeria: Essays in Society, Politics and Economy
. Buenos Aires: EDIPUBLI, 1992.
Yusuf, Bala Usman
.
The Sokoto Caliphate and Nation-building
In
speech at the opening of the International Conference on the Sokoto caliphate and its legacies
. Abuja, 2004.
Ake, Claude
.
"
The Nigerian State: Antinomies of a Periphery Formation
." In
Political Economy of Nigeria
. London: Longman, 2001.
Citrin, Jack
,
Cara Wong
, and
Brian Duff
.
"
The Meaning of American Identity: Patterns of Ethnic Conflict and Consensus
." In
Social Inequality, Intergroup Conflict and Conflict Resolution
, 51-100. New York: Oxford University Press, 2000.
Alubo, Sylvester Ogoh
.
Ethnic Conflicts and Citizenship Crisis in the Central Region
. University of Ibadan: Programme on Ethnic and Federal Studies, 2006.
Ilega, D. I.
.
"
Proliferation of Religious Organizations and How it Adds to the Nigerian Society
." In
The Nigerian environment and socio-economic development
, 265-278. Port Harcourt, Rivers State [Nigeria]: SIJ Publishers, 1998.
Oluwajuyitan, Jide
.
Boko Haram and the Dialogue Option
. Jide Oluwajuyitan Blog, 2011.
Pages
« първа
‹ предишна
…
80
81
82
83
84
85
86
87
88
…
следваща ›
последна »
498465 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance