Vesselin Petkov IntroductionShort CVinsert short SV here Full profileThis is the longer CV, presenting education, work experience, etc. Publications D., Harinath, Ramana M.V., and Chitra B.. "Cryptographic Methods and Performance Analysis of Data Encryption Algorithms in Network Security." International Journal of Advanced Research in Computer Science and Software Engineering 5, no. 7 (2015): 680-6. Z., Dimovski, and Ilijevski I.. International Terrorism. Skopje: Grafortrans, 2011. OECD Guidelines for the Security of Information Systems and Networks: Towards a Culture of Security. OECD Council, 2002. European Network and Information Security Agency(ENISA). The new users' guide: How to raise information security awareness., 2010. Wilson, Mark, and Joan Hash. Building an Information Technology Security Awareness and Training Program, Computer Security In NIST Special Publication., 2003. OSCE Guide on Non-military confidence-building Measures (CBMs)., 2015. H. Rao, Raghav, and Shambhu Upadhyaya. nformation Assurance, Security and Privacy Services. UK: Emerald Group Publishing Limited, 2009. Poposka, Vesna. "The Urge for Comprehensive Cyber Security Strategies in the Western Balkan." Information & Security: An International Journal 34, no. 1 (2016): 25-36. Tasevski, Predrag. "Cyber Awareness, Strategies, and Practice." Information & Security: An International Journal 34, no. 1 (2016): 5-6. Tagarev, Todor, and George Sharkov. "Multi-stakeholder Approach to Cybersecurity and Resilience." Information & Security: An International Journal 34, no. 1 (2016): 59-68. Sekuloski, Milan. "Security Sector Reform Wisdom for Cyber Security Institution Building: The Case of Serbia." Information & Security: An International Journal 34, no. 1 (2016): 69-90. Rademaker, Michel. "Assessing Cyber Security 2015." Information & Security: An International Journal 34, no. 2 (2016): 93-104. Klaic, Aleksandar. Knowledge Management Based Method for Modeling of Information Security Policies (in Croatian) In Faculty of Electrical Engineering and Computing. Vol. Doctoral Thesis. Zagreb, 2014. ENISA. National Cyber Security Strategies in the World., 2015. NATO. Cyber Security Strategy Documents. Cooperative Cyber Defence Centre of Excellence (CCDCOE), 2015. Commission, European. The Directive on security of network and information systems (NIS Directive) In Digital Agenda for Europe, A Europe 2020 Initiative, Network and Information Security., 2015. The UK Cyber Security Strategy: Protecting and promoting the UK in a digital world., 2011. Minchev, Zlatogor. "Human Factor Role for Cyber Threats Resilience." In Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare., 2015. Wrightson, Tyler. Advanced Persistent Threat Hacking. McGraw-Hill Education, 2015. 2015 Global Megatrends in Cybersecurity. Ponemon Institute, 2015. Boyanov, L., and Zlatogor Minchev. "Cyber Security Challenges in Smart Homes, Cyber Security and Resiliency Policy Framework." Cyber Security and Resiliency Policy Framework 38 (2014). The Executive Branch. the White House, 2015. Rocha, L.. Computer Security Incident Handling – 6 Steps. Count Upon Security., 2012. Department of Homeland Security(DHS). Department of Homeland Security Strategic Plan. U.S. Department of Homeland Security. (2012-2016)., 2012. Department of Homeland Security(DHS). National Cyber Incident Response Plan, Interim Version., 2010. Pages« първа ‹ предишна … 172 173 174 175 176 177 178 179 180 … следваща › последна »