Top downloads
Title | Downloads |
---|---|
Development of the Deterrent and Defense Capacity of NATO in Eastern Europe: Approach to Readiness and Interoperabiltiy |
(131) |
Опит в развитието на лидери на промяната за НАТО |
(141) |
Hybrid warfare against (the naming of) the Hybrid warfare |
(235) |
Resilience: Cyber / Technology dimension |
(135) |
From Strategy to Capabilities: Transformation, Innovation and Interoperability |
(527) |
Innovation Platform for Security Capability Development: Innovation for Transformation – roles in the 4 quadrants |
(145) |
Not-For-Profit Framework (NFPF): Improved capacity management for NCIA Support to Interoperability and Innovation in NATO Effectiveness, Efficiency and Savings for C&I R&D/E&T Improved NATO – EU coordination and cooperation |
(142) |
Service based organisation for security and law enforcement space enabled support |
(133) |
Organizing for Cyber Resilience: Identification and Management of the Organizational Cyber Risk |
(132) |
Current and Emerging Regional Threats: Risk assessment and Cooperative approach – View from Bulgaria |
(148) |
Current and Emerging Regional Threats: SEE Risk assessment- View from Bulgaria |
(151) |
Cyber Defence Stakeholders and respective Governance / Management Structure in NATO context |
(134) |
Appropriate Roles of the Military and Governmental Institutions in Protecting Cyber Aspects of Critical Infrastructure and Critical Information Infrastructure |
(151) |
Challenges of Security Sector Reform: Institutional Experiences |
(64) |
Security Sector Reform: Policy and Management Aspects |
(101) |
How to develop an effective, efficient and democratic defence institution - the lessons we are learning |
(89) |
Principles of Defence Management |
(134) |
Building Integrity in Defence: Role of Parliaments |
(82) |
Crisis management related research at the IT for Security Department |
(80) |
Civilian Control in Defence (in Russian) |
(66) |
Guerrilla Operations in Western Sahara: The Polisario versus Morocco and Mauritania |
(109) |
Guerrilla Operations in Western Sahara: The Polisario versus Morocco and Mauritania |
(132) |
The South Caucasus: A playground between NATO and Russia? |
(115) |
The South Caucasus: A playground between NATO and Russia? |
(239) |
The Image of Security Sector Agencies as a Strategic Communication Tool |
(105) |
The Image of Security Sector Agencies as a Strategic Communication Tool |
(151) |
Managing Defence Capabilities' Development |
(500) |
Smuggling as a Threat to National and International Security: Slovenia and the Balkan Route |
(136) |
The Evolution of Estonian Security Options During the 1990s |
(150) |
Long-Term Possibilities for NATO-Russia Naval Security Cooperation |
(147) |
After the Re-election of President Bush: An Outlook on Transatlantic Relations from a German Perspective; or, Why German-U.S. Relations Still Matter to the Transatlantic Alliance |
(162) |
Operation Allied Force: A Case of Humanitarian Intervention? |
(136) |
Civilianisation of the Defence Ministry: A Functional Approach to a Modern Defence Institution |
(74) |
Defence Policy of Republic of Bulgaria: Critical Analysis |
(207) |
Britain and the Common Security and Defense Policy of the European Union |
(138) |
Britain and the Common Security and Defense Policy of the European Union |
(110) |
Arms Control Arrangements under the Aegis of the OSCE: Is There a Better Way to Handle Compliance? |
(109) |
Arms Control Arrangements under the Aegis of the OSCE: Is There a Better Way to Handle Compliance? |
(148) |
Recommendations and Courses of Action: How to Secure the Post-Covid Future |
(193) |
The Death of bin Laden, and the Future of Al-Qaeda |
(72) |
International Terrorism and International Tourism |
(78) |
Bosnia and Herzegovina and Terrorism 1996-2011: Defining the Threat, Devising Counterterrorism Strategy |
(150) |
Aspects of Recruitment by Terrorist Organizations in Europe’s Muslim Communities |
(70) |
Understanding Homegrown Terrorism |
(119) |
International Intelligence Cooperation against Terrorist Targets – Phase II |
(86) |
Challenges of Intelligence Sharing in Combating Terrorism: An Academic Point of View |
(262) |
Violent Converts to Islam: Growing Cluster and Rising Trend |
(154) |
Islamic Extremism – Analyzing the Risks |
(64) |
Terrorist Innovation: Homegrown Terrorism and the Internet |
(69) |
After Bin Laden: Jihadist Terrorist Use of Strategic Communication to Enlarge the Community of Believers |
(63) |