Vesselin Petkov IntroductionShort CVinsert short SV here Full profileThis is the longer CV, presenting education, work experience, etc. Publications Balzarotti, Davide, and Evangelos Markatos. The Red Book – A Roadmap for Systems Security Research. SysSec Consortium, 2013. Cybersecurity in 2015: What to expect? In 2015 Global Megatrends in Cybersecurity. ZDNET, 2014. Thompson, K. K.. "Not Like an Egyptian: Cybersecurity and the Internet Kill Switch Debate." In Texas Law Review, 465-495. Vol. 90., 2011. House, White. Securing Cyberspace – President Obama Announces New Cybersecurity Legislative Proposal and Other Cybersecurity Efforts In The White House., 2015. Newmeyer, K.. Cybersecurity and the 2015 State of the Union Address. Cyber Experts Blog at National Cybersecurity Institute., 2015. Newmeyer, K.. Cybersecurity in the President’s National Security Strategy. Cyber Experts Blog at National Cybersecurity Institute., 2015. Sylvertooth, R.. Government Cyber Agency Will Be Here Shortly! Cyber Experts Blog at National Cybersecurity Institute., 2015. Hudson, D.. President Obama Speaks at the White House Summit on Cybersecurity and Consumer Protection. The White House Blog. ., 2015. Newmeyer, K.. Executive Order on Cybersecurity: Billion-Dollar Bank Heist. Cyber Experts Blog at National Cybersecurity Institute., 2015. Office, Department for Educat. How social media is used to encourage travel to Syria and Iraq briefing note for school., 2015. B., Jenkins. International Terrorism. Los Angeles, 1975. A.P., Schmid. Radicalisation, De-Radicalisation, Counter-Radicalisation: A Conceptual Discussion and Literature Review. Hague: International Centre for Counter-Terrorism Research Paper, 2003. Ashour, O.. The De-Radicalization of Jihadists: Transforming armed Islamist movements, Routledge. London, 2009. J., Sinai. "Radicalization into Extremism and Terrorism." Intelligencer: Journal of U.S. Intelligence Studies 19, no. 2 (2012). A.P., Schmid. Glossary and Abbreviations of Terms and Concepts Relating to Terrorism and Counter-Terrorism. London: Routledge, 2011. G., Weimann. The Internet as a Terrorist Tool to Recruit Youth. Arlington: Youth Recruitment & Radicalization Roundtable, 2009. London, King’s College. Recruitment and Mobilization for the Islamist Militant Movement in Europe. London: King’s College, 2007. A., Kaczynski. 8 Ways Terrorists Use the Internet for Recruitment., 2014. J.M., Berger. How ISIS Games Twitter., 2014. The Terrorist’s Handbook., 2005. Powell, William. The Anarchist Cookbook. Barricade Books, 2002. Aziz, Abdel –. The Mujahideen Poisons Handbook., 2004. , Stephen R.B., and Valeria C.. "The Encyclopedia of Jihad." Faculty Publications and Presentations, Liberty University, 2001. M., Alexei, Stephen R.B., and Valeria C.. "The Encyclopedia of Jihad." Faculty Publications and Presentations, Liberty University, 2001. Justice, The U. S. Departm. The Sabotage Handbook., 2001. Pages« първа ‹ предишна … 175 176 177 178 179 180 181 182 183 … следваща › последна »