skip to content
Breaching the fortress wall : understanding terrorist efforts to overcome defensive technologies Preview this item
ClosePreview this item
Checking...

Breaching the fortress wall : understanding terrorist efforts to overcome defensive technologies

Author: Brian A Jackson; United States. Department of Homeland Security.; et al
Publisher: Santa Monica, CA : RAND Homeland Security, 2007.
Series: Rand Corporation monograph series.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Database:WorldCat
Summary:
The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to target groups? efforts and protect the public from the threat of terrorist violence. Terrorist organizations are  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Case studies
Additional Physical Format: Print version:
Breaching the fortress wall.
Santa Monica, CA : RAND Homeland Security, 2007
(DLC) 2006001721
(OCoLC)63125906
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Brian A Jackson; United States. Department of Homeland Security.; et al
ISBN: 9780833042477 0833042475
OCLC Number: 183658196
Notes: "Prepared for the Department of Homeland Security."
"MG-481-DHS"--P. [4] of cover.
Description: 1 online resource (xxviii, 153 p.) : ill., maps.
Contents: Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One --
Introduction; Chapter Two --
Palestinian Terrorist Groups; Chapter Three --
Jemaah Islamiyah and Affiliated Groups; Chapter Four --
Liberation Tigers of Tamil Eelam; Chapter Five --
Provisional Irish Republican Army; Chapter Six --
Conclusions: Understanding Terrorists' Countertechnology Efforts; Appendix; Bibliography;
Series Title: Rand Corporation monograph series.
Responsibility: Brian A. Jackson ... [et al.].

Abstract:

Technology systems play a key role within a larger, integrated strategy to target groups' efforts and protect the public from the threat of terrorist violence. This study draws on relevant data from  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


<http://www.worldcat.org/oclc/183658196>
library:oclcnum"183658196"
library:placeOfPublication
library:placeOfPublication
owl:sameAs<info:oclcnum/183658196>
rdf:typeschema:Book
rdfs:seeAlso
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
rdf:typeschema:Organization
schema:name"War on Terrorism (2001-2009)"
schema:about
rdf:typeschema:Organization
schema:name"War on Terrorism (2001-2009)"
schema:about
schema:about
schema:about
schema:about
schema:about
rdf:typeschema:Intangible
schema:name"POLITICAL SCIENCE--Political Freedom & Security--Terrorism."
schema:about
rdf:typeschema:Intangible
schema:name"POLITICAL SCIENCE / Terrorism"
schema:about
schema:about
schema:about
schema:about
schema:about
schema:bookFormatschema:EBook
schema:contributor
schema:contributor
schema:datePublished"2007"
schema:description"Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One -- Introduction; Chapter Two -- Palestinian Terrorist Groups; Chapter Three -- Jemaah Islamiyah and Affiliated Groups; Chapter Four -- Liberation Tigers of Tamil Eelam; Chapter Five -- Provisional Irish Republican Army; Chapter Six -- Conclusions: Understanding Terrorists' Countertechnology Efforts; Appendix; Bibliography;"
schema:description"The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to target groups? efforts and protect the public from the threat of terrorist violence. Terrorist organizations are acutely aware of government efforts to deploy these systems and actively seek ways to evade or counteract them. This study draws on relevant data from the history of a variety of terroris."
schema:exampleOfWork<http://worldcat.org/entity/work/id/137561856>
schema:genre"Case studies"
schema:genre"Case studies."
schema:inLanguage"en"
schema:name"Breaching the fortress wall understanding terrorist efforts to overcome defensive technologies"
schema:numberOfPages"153"
schema:publisher
schema:url<http://www.rand.org/pubs/monographs/2007/RAND_MG481.pdf>
schema:url<http://books.google.com/books?id=fUzlAAAAIAAJ>
schema:url<http://site.ebrary.com/id/10225503>
schema:url<http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=213900>
schema:url<http://www.jstor.org/stable/10.7249/MG481DHS>
schema:url<http://www.myilibrary.com?id=118090>
schema:workExample
schema:workExample

Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.