The PENGUIN English Dictionary, Penguin Books, 2003. ,
General Procedure of Risk Management, pp.15-24, 2012. ,
Cyber Forensics Assurance In: The Proceedings of the 8th Australian Digital Forensics Conference, pp.57-64, 2010. ,
Securing corporate assets: Protecting a business against cloak-and-dagger tactics requires a manager's eye for efficiency, Industrial Engineer: IE, vol.35, pp.39-43, 2003. ,
Bezpe?nost dat v informa?ních systémech, Ikaros, vol.15, 2011. ,
Process Oriented Architecture for Emergency Scenarios in the Czech Republic, World Academy of Science, Engineering and Technology, vol.1, pp.2342-2351, 2011. ,
Process Methodology for Emergency Management, IFIP Advances in Information and Communication Technology, pp.302-309, 2011. ,
DOI : 10.1007/978-3-642-22285-6_33
The art of deception: controlling the human element of security, 2002. ,
Scéná?e adaptivní kamuflá?e, Tribun EU, 2012. ,
A Development of Wireless Interoper-mobile Application for Outdoor Operation Management, 8 th Int. Conf. on Electronics, hardware, wireless and optical communications, pp.57-64, 2009. ,