Vesselin Petkov IntroductionShort CVinsert short SV here Full profileThis is the longer CV, presenting education, work experience, etc. Publications Holehouse, Matthew. "Counter-Terrorism Bill: What It Contains." Telegraph (2014). Smith-Spark, Laura, and Deborah Feyerich. How ISIS New Hostage Strategy is Shifting the Goalposts. CNN, 2015. Dolnik, Adam. "The Dynamics of Terrorist Innovation." In Understanding Terrorism Innovation and Learning: Al-Qaeda and Beyond, 76-95. Oxon and New York: Routledge, 2015. Buzan, Barry. Strategic Studies: Military Technology & International Relations. New York: St. Martin’s Press, 1987. Murray, Williamson. "Innovation: Past and Future." In Military Innovation in the Interwar Period, 306. London: Cambridge University Press, 1998. Hoffman, Bruce. "Terrorist Targeting: Tactics, Trends, and Potentialities." Terrorism and Political Violence 5, no. 2 (1993): 13. Rosen, Stephen P.. Winning the Next War: Innovation and the Modern Military. London: Cornell University Press, 1991. Dolnik, Adam. "Fighting to the Death." RUSI Journal 155, no. 2 (2010): 60-68. Dolnik, Adam. Understanding Terrorist Innovation: Technology, Tactics and Global Trends. London: Routledge, 2007. Jackson, Brian. "Technology Acquisition by Terrorist Groups: Threat Assessment Informed by Lessons from Private Sector Technology Adoption." Studies in Conflict and Terrorism 24, no. 3 (2001): 183-213. J. Bell, Bowyer. The Dynamics of the Armed Struggle. London: Frank Cass, 1990. Dobson, Christopher, and Ronald Payne. The Terrorists, Their Weapons, Leaders and Tactics. New York: Facts on File, 1982. Ronfeld, David, and William Sater. "The Mindset of High-Technology Terrorists: Future Implications from the Historical Analog." In Political Terrorism and Energy, 22. New York: Praeger Publishers, 1982. al-Mawardi, Abu al- Hasan. Al-Ahkam as-Sultaniyyah In Qur’an sura 47, verse 4. London: Ta-Ha Publishers, 1996. Marks, Tom. "Making Revolution with Shining Path." In Shining Path of Peru, 214. New York: St Martin’s Press, 1994. Lebow, Richard Nel. Between Peace and War. Baltimore: Johns Hopkins University Press, 1981. Raghavan, Sudarsan, and Peter Finn. "Al-Qaeda bombmaker Ibrahim Hassan al-Asiri has tried to attack the U.S. three times, officials say." Washington Post (2012). Moghadam, Assaf. "How Al Qaeda Innovates." Security Studies 22, no. 3 (2013): 466-97. Taylor, Guy. "Apocalypse Prophecies Drive Islamic State Strategy, Recruiting Efforts." Washington Times (2015). Mello, Alexandre, and Michael Knights. "The Cult of the Offensive: The Islamic State on Defense." CTC Sentinel 8, no. 4 (2015): 1-6. Corera, Gordon. The World’s Most Wanted Cyber-Jihadist. BBC News, 2008. Doornbos, Harald, and Jenan Moussa. "Found: The Islamic State’s Terror Laptop of Doom." Foreign Policy (2014). Silke, Andrew. "Holy Warriors: Exploring the Psychological Processes of Jihadi Radicalization." European Journal of Criminology 5, no. 1 (2008): 99-123. Shelley, Louise I., and John T. Picarelli. "Methods Not Motives: Implications of the Convergence of International Organized Crime and Terrorism." Police Practice and Research: An International Journal 3, no. 4 (2002): 305-18. Monaghan, Rachel. "An Imperfect Peace’: Paramilitary ‘Punishments’ in Northern Ireland." Terrorism and Political Violence 16, no. 3 (2004): 439-61. Pages« първа ‹ предишна … 143 144 145 146 147 148 149 150 151 … следваща › последна »