Biblio
Export 21441 results:
Fighting to the Death." RUSI Journal 155, no. 2 (2010): 60-68.
"Fighting to the Death: Mumbai and the Future Fidayeen Threat." RUSI Journal 155, no. 2 (2010): 60-68.
"FIM model applied in disaster situations on the highway network. Southwest Jiaotong University, 2010.
Finland: Crisis Management and Territorial Defence." CSS Analysis in Security Policy 68 (2010).
"Fire Safety Act., 2010.
On Five Levels of Security. Sofia: Military publishing house, 2010.
Five years research and development of information systems for security In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2010.
Fixing Intel: A Blueprint for Making Intelligence Relevant in Afghanistan. Washington, D.C.: Center for a New American Security, 2010.
For a new approach to the modernization of the Bulgarian armed forces In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2010.
For effective and efficient security sector In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2010.
For the West, ‘Game Over’ in Central Asia." European Dialogue (2010).
"Foreign Fighters: Trends, Trajectories and Conflict Zones. Washington, DC: George Washington University Homeland Security Policy Institute, 2010.
Foreword." Connections: The Quarterly Journal 9, no. 3 (2010): 1-2.
"Foreword." In Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices. Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2010.
"Formal approach to security metrics. What does ‘more secure’ mean for you? In IEEE/ASME International Conference on Mechatronic and Embedded Systems and Applications., 2010.
Formal Methods." In Encyclopedia of Software Engineering, ed. Philip A. Laplante, 308-320. Taylor & Francis, 2010.
"Foundations of Information Security Based on ISO27001 and ISO27002. Van Haren Publishing, 2010.
Four Important Natural Hazards from Romania." Romanian Journal of Mineral Deposits 84 (2010): 113-115.
"A Framework for Health Care Information Assurance Policy and Compliance." Communications of the ACM 53, no. 3 (2010): 126-131.
"A framework for Internal Fraud Risk Reduction at IT Integrating Business Processes: The IFR² Framework." International Journal of Digital Accounting Research 9 (2010).
" "From Cottage Industry to International Organisation: The Evolution of Salafi-Ji-hadism and the Emergence of the Al Qaeda Ideology." Terrorism and Political Violence 22 (2010): 542.
"From States to Polities: Reconceptualizing Sovereignty through Inuit Governance." European Journal of International Relations 16, no. 3 (2010): 485-510.
"From Yokohama Strategy to Hyogo Framework: Sharing the Japanese Experience of Disaster Risk Management." Asian Journal of Environment and Disaster Management 2, no. 3 (2010): 249-262.
"