Memorandum of Understanding and Partnership signed between C3I & E-security
On 20th October 2016, in Zagreb, a Memorandum of Understanding and Partnership was signed between the Association “E-security” represented by
Read moreOn 20th October 2016, in Zagreb, a Memorandum of Understanding and Partnership was signed between the Association “E-security” represented by
Read more[pdf-embedder url=”https://c3initiative.com/wp-content/uploads/2016/10/The-Relationship-and-mutual-influence-between-Sovereign-equality-of-states-Integration-and-Human-Rights-and-Freedoms-Ljubica-Pendaroska-and-Ilija-Djugumanov.pdf” title=”The Relationship and mutual influence between Sovereign equality of states, Integration and Human Rights and Freedoms-Ljubica Pendaroska and
Read moreFrom 17th to 21st of October 2016 in Zagreb, Croatia, the C3I staff has participated at “Building a Cyber Resilient
Read more[:en]Electronic transactions and Money laundering[:]
Read more[:en][pdf-embedder url=”https://c3initiative.com/wp-content/uploads/2016/10/The-Impact-and-the-Role-of-NATO-on-Political-and-Security-Situation-in-Macedoni-Yesterday-Today-Tomorrow-Ljubica-Pendaroska-Stojan-Slaveski.pdf” title=”The Impact and the Role of NATO on Political and Security Situation in Macedoni-Yesterday, Today, Tomorrow Ljubica Pendaroska
Read more[:en][pdf-embedder url=”https://c3initiative.com/wp-content/uploads/2016/10/Use-of-force-in-self-defense-against-cyber-attacks-and-the-shockwaves-in-the-legal-community-one-more-reason-for-holistic-legal-approach-to-cyberspace-Metodi-Hadji-JanevStevan-Aleksoski.pdf” title=”Use of force in self-defense against cyber-attacks and the shockwaves in the legal community-one more reason for holistic
Read more[:en][pdf-embedder url=”https://c3initiative.com/wp-content/uploads/2016/10/Use-of-force-against-cyber-attacks-Metodi-Hadji-Janev.pdf” title=”Use of force against cyber attacks Metodi Hadji-Janev”][:]
Read more[:en][pdf-embedder url=”https://c3initiative.com/wp-content/uploads/2016/10/Toward-Effective-National-Cyber-Security-Strategy-the-path-that-Macedonia-must-consider-Metodi-Hadji-Janev.pdf” title=”Toward Effective National Cyber Security Strategy-the path that Macedonia must consider Metodi Hadji-Janev”][:]
Read more[:en][pdf-embedder url=”https://c3initiative.com/wp-content/uploads/2016/10/Threats-to-the-Critical-Infrastructure-in-South-East-Europe-posed-by-Al-Qaeda-and-its-Associated-Movements-the-case-of-Macedonia-Metodi-Hadji-Janev.pdf” title=”Threats to the Critical Infrastructure in South-East Europe posed by Al Qaeda and its Associated Movements-the case of
Read more[:en][pdf-embedder url=”https://c3initiative.com/wp-content/uploads/2016/10/Threats-to-the-Critical-Information-Infrastructure-Protection-CIIP-posed-by-Modern-Terrorism-Metodi-Hadji-Janev.pdf” title=”Threats to the Critical Information Infrastructure Protection-CIIP posed by Modern Terrorism Metodi Hadji-Janev”][:]
Read more