Found 13703 results
CCNA Security In Cisco Networking Academy., 2016.
Certifications In The Cisco Learning Network., 2016.
Challenges to Human Factor for Advance Persistent Threats Proactive Identification in Modern Social Networks." Information & Security: An International Journal 34 (2016)."
Challenging the Yemeni State: ISIS in Aden and al Mukalla." Critical Threats (2016)."
A Changing Security Paradigm. New Roles for New Actors – The Russian Approach." Connections: The Quarterly Journal 15, no. 4 (2016): 31-43."
Chief, Nuclear, CBRN Defence and Arms Control Policy Branch In interviewed by the author. NATO International Military Staff, 2016.
Children born of war in northern Uganda: kinship, marriage, and the politics of post-conflict reintegration in Lango society. Vol. Thesis submitted to the University of Birmingham for the degree of DOCTOR OF PHILOSOPHY. University of Birmingham, 2016.
China and the evolution of power: What is motivating China to adopt soft power strategies and how effective have these strategies been? In Political Science: International Relations. Vol. Master Thesis. Universiteit van Amsterdam, 2016.
Cisco Networking Academy., 2016.
A Comprehensive Strategy for Combating Terrorism." In Combating Transnational Terrorism, 253-270. Sofia: Procon, 2016."
Confidence of the University Youth in Armed Forces and Information Sources." In Current Topics in Social Sciences, 474-483. Sofia: St. Kliment Ohridski University Press, 2016."
The Contemporary Spectrum of Conflict. Protracted, Gray Zone, Ambiguous, and Hybrid Modes of War. Washington, D.C.: The Heritage Foundation, 2016.
Core Competencies of Piracy and Maritime Terrorism." Journal of Defense Resources Management (2016)."
Counterfeiting. Encyclopedia Britannica Online, 2016.
Countering Putin’s Nuclear-backed Aggression with a Continuous Nuclear-Capable Bomber Presence In Technical Report. Newport Ri, United States: Naval War College, 2016.
Countering Violent Extremism." In Combating Transnational Terrorism, 199-216. Sofia: Procon, 2016."
Counter-Terrorist Financing." In Combating Transnational Terrorism, 217-234. Sofia: Procon, 2016."
Criminal Pasts, Terrorist Futures: European Jihadists and the New Crime-Terror Nexus. Vol. 5. London: International Centre for the Study of Radicalisation, 2016.
Critical Information Infrastructure Protection Model and Methodology, Based on National and NATO Study In Advances in Dependability Engineering of Complex Systems, Proceedings of the Twelfth International Conference on Dependability Problems and Complex Systems DepCoS-RELCOMEX. Brunow, Poland, 2016.
Cyber Operations and Gray Zones: Challenges for NATO." Connections: The Quarterly Journal 15, no. 2 (2016): 109-119."
Cyber Security Teaching and Learning Laboratories: A Survey." Information & Security: An International Journal 35, no. 1 (2016): 51-80."
Cybersecurity: A Generic Reference Curriculum. Kingston, ON: National Defence, 2016.
Cyberspace as the Environment Affected by Organized Crime Activity." Connections: The Quarterly Journal 15, no. 3 (2016): 55-64."
Czym jest współczesna wojna?., 2016.