Organization
Macedonian Path Towards Cybersecurity
Macedonian Path Towards Cybersecurity." Information & Security: An International Journal 32, no. 2 (2015): 109-119.
Macedonian Path Towards Cybersecurity — Downloaded 10432 times
"
Creating and Strengthening Cybersecurity in the Republic of Moldova
Creating and Strengthening Cybersecurity in the Republic of Moldova." Information & Security: An International Journal 32, no. 2 (2015): 97-108.
Creating and Strengthening Cybersecurity in the Republic of Moldova — Downloaded 8102 times
"
Trusted Networks Initiative: The Netherlands’ Response to DDoS Attacks
Trusted Networks Initiative: The Netherlands’ Response to DDoS Attacks." Information & Security: An International Journal 32, no. 1 (2015): 65-70.
Trusted Networks Initiative: The Netherlands’ Response to DDoS Attacks — Downloaded 6484 times
"
Cyberterrorism and Turkey’s Counter-Cyberterrorism Efforts
Cyberterrorism and Turkey’s Counter-Cyberterrorism Efforts." Information & Security: An International Journal 32, no. 1 (2015): 42-64.
Cyberterrorism and Turkey’s Counter-Cyberterrorism Efforts — Downloaded 10527 times
"
French Cyber Security and Defence: An Overview
French Cyber Security and Defence: An Overview." Information & Security: An International Journal 32, no. 1 (2015): 29-41.
French Cyber Security and Defence: An Overview — Downloaded 17564 times
"
Organising National Cybersecurity Centres
Organising National Cybersecurity Centres." Information & Security: An International Journal 32, no. 1 (2015): 9-26.
Organising National Cybersecurity Centres — Downloaded 8010 times
"
Roles and Functions of Cybersecurity Manager
At issue is an overview of the requirements for the person who performs the functions of cybersecurity manager focusing on its roles and responsibilities. Among the main roles are considered obligations of the cybersecurity manager to formulate objectives, priorities and tasks within the department, creating a team of specialists in cybersecurity, balancing the interests and needs of participants in the team, etc.
Securing Cyberspace
Securing Cyberspace." Information & Security: An International Journal 18 (2006): 5-10.
1800_securing_cyberspace.pdf — Downloaded 1453 times
"
Challenges in E-Government and Security of Information
Challenges in E-Government and Security of Information." Information & Security: An International Journal 15, no. 1 (2004): 9-20.
15.01_Hwang_Li_ Shen_Chu.pdf — Downloaded 16573 times
"