Biblio

Found 13409 results
2016
Porter, Geoff D.. "How realistic is Libya as an Islamic State “fallback”?" CTC Sentinel 9, no. 3 (2016): 1-5.
Porup, J.M.. How to Search the Internet of Things for Photos of Sleeping Babies. ArsTechnica, 2016.
Giegerich, Bastian. "Hybrid Warfare and the Changing Character of Conflict." Connections: The Quarterly Journal 15, no. 2 (2016): 65-72.
Nowakowska-Krystman, Aneta, and Piotr Gawliczek. "The Image of Piracy and Maritime Terrorism – Media as the Tool for its Development." Journal of Defense Resources Management (2016).
Androulidakis, Iosif, Vyacheslav Kharchenko, and Andriy Kovalenko. "Imeca-Based Technique for Security Assessment of Private Communications: Technology and Training." Information & Security: An International Journal 35, no. 1 (2016): 99-120.
Tagarev, Todor. "The Impact of Corruption on National Security and Counter-corruption Strategies." In Foreword to Karin Meghesan and Valentin Stoian, Corruption and National Security: Evaluation and Response, 7-21. Bucharest: National Intelligence Academy “Michai Viteazul”, 2016.
"In the Words of the Enemy." Dabiq, no. 10 (2016): 67.
"Index." In Combating Transnational Terrorism, 273-277., 2016.
Naseemullah, Adnan, and Paul Staniland. "Indirect Rule and Varieties of Governance." Governance 29, no. 1 (2016): 13-30.
van Bochoven, Leendert. "Industry and Policy: Partnerships in Disruptive Times." Connections: The Quarterly Journal 15, no. 2 (2016): 19-29.
Innocentive., 2016.
Gordieiev, Oleksandr, Taras Lobur, and Ruslan Kozak. "Integrating Cisco Systems’ Educational Programs in ICT Security Academic Curricula." Information & Security: An International Journal 35, no. 2 (2016): 151-163.
Clarke, Peter. "Intelligence-led Policing in Counter-Terrorism: A Perspective from the United Kingdom." In Combating Transnational Terrorism, 149-162. Sofia: Procon, 2016.
Prezelj, Iztok, and Joe Airey. "Interagency Cooperation in Counter-Terrorism." In Combating Transnational Terrorism, 235-252. s: Procon, 2016.
International Drug Control Conventions., 2016.
Schneier, Bruce. The Internet of Things Talks About You Behind Your Back., 2016.
"Interview with the Wali of Khurasan." Dabiq, no. 13 (2016): 48-58.
Gerges, Fawaz A.. ISIS. A History. Princeton, NJ: Princeton University Press, 2016.
Sanchez, Ray, Tim Lister, Mark Bixler, Sean O’Key, Michael Hogenmiller, and Mohammed Tawfeeq. ISIS goes global: 143 attacks in 29 countries have killed about 2,043 people. CNN International Edition, 2016.
ISIS supporters claim group responsible for Brussels attacks: ‘We have come to you with slaughter’. Independent, 2016.
Istanbul airport bombers were Russian, Uzbek, Kyrgyz: Turkish official. Reuters, 2016.
Yeginsu, Ceylan, and Victor Homola. "Istanbul Bomber Entered as a Refugee, Turks Say." The New York Times (2016).
ITACS., 2016.
The Italian Mafia., 2016.
Mullins, Sam. "Jihadist Foreign Fighters and ‘Lone Wolf’ Terrorism." In Combating Transnational Terrorism, 115-130. Sofia: Procon, 2016.

Pages