omitir hasta el contenido
Breaching the fortress wall : understanding terrorist efforts to overcome defensive technologies Ver este material de antemano
CerrarVer este material de antemano
Chequeando…

Breaching the fortress wall : understanding terrorist efforts to overcome defensive technologies

Autor: Brian A Jackson; United States. Department of Homeland Security.; et al
Editorial: Santa Monica, CA : RAND Homeland Security, 2007.
Serie: Rand Corporation monograph series.
Edición/Formato:   Libro-e : Documento : Inglés (eng)Ver todas las ediciones y todos los formatos
Base de datos:WorldCat
Resumen:
The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to target groups? efforts and protect the public from the threat of terrorist violence. Terrorist organizations are  Leer más
Calificación:

(todavía no calificado) 0 con reseñas - Ser el primero.

Temas
Más materiales como éste

 

Encontrar un ejemplar en línea

Enlaces a este material

Encontrar un ejemplar en la biblioteca

&AllPage.SpinnerRetrieving; Encontrando bibliotecas que tienen este material…

Detalles

Género/Forma: Electronic books
Case studies
Formato físico adicional: Print version:
Breaching the fortress wall.
Santa Monica, CA : RAND Homeland Security, 2007
(DLC) 2006001721
(OCoLC)63125906
Tipo de material: Documento, Recurso en Internet
Tipo de documento: Recurso en Internet, Archivo de computadora
Todos autores / colaboradores: Brian A Jackson; United States. Department of Homeland Security.; et al
ISBN: 9780833042477 0833042475
Número OCLC: 183658196
Notas: "Prepared for the Department of Homeland Security."
"MG-481-DHS"--P. [4] of cover.
Descripción: 1 online resource (xxviii, 153 p.) : ill., maps.
Contenido: Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One --
Introduction; Chapter Two --
Palestinian Terrorist Groups; Chapter Three --
Jemaah Islamiyah and Affiliated Groups; Chapter Four --
Liberation Tigers of Tamil Eelam; Chapter Five --
Provisional Irish Republican Army; Chapter Six --
Conclusions: Understanding Terrorists' Countertechnology Efforts; Appendix; Bibliography;
Título de la serie: Rand Corporation monograph series.
Responsabilidad: Brian A. Jackson ... [et al.].

Resumen:

Technology systems play a key role within a larger, integrated strategy to target groups' efforts and protect the public from the threat of terrorist violence. This study draws on relevant data from  Leer más

Reseñas

Reseñas contribuidas por usuarios
Recuperando reseñas de GoodReads…
Recuperando reseñas de DOGObooks…

Etiquetas

Ser el primero.
Confirmar este pedido

Ya ha pedido este material. Escoja OK si desea procesar el pedido de todos modos.

Datos enlazados


<http://www.worldcat.org/oclc/183658196>
library:oclcnum"183658196"
library:placeOfPublication
library:placeOfPublication
owl:sameAs<info:oclcnum/183658196>
rdf:typeschema:Book
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
<http://id.worldcat.org/fast/1148123>
rdf:typeschema:Intangible
schema:name"Terrorism--Prevention"@en
schema:name"Terrorism--Prevention."@en
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:bookFormatschema:EBook
schema:contributor
<http://viaf.org/viaf/121741457>
rdf:typeschema:Organization
schema:name"United States. Department of Homeland Security."
schema:contributor
schema:datePublished"2007"
schema:description"Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One -- Introduction; Chapter Two -- Palestinian Terrorist Groups; Chapter Three -- Jemaah Islamiyah and Affiliated Groups; Chapter Four -- Liberation Tigers of Tamil Eelam; Chapter Five -- Provisional Irish Republican Army; Chapter Six -- Conclusions: Understanding Terrorists' Countertechnology Efforts; Appendix; Bibliography;"@en
schema:description"The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to target groups? efforts and protect the public from the threat of terrorist violence. Terrorist organizations are acutely aware of government efforts to deploy these systems and actively seek ways to evade or counteract them. This study draws on relevant data from the history of a variety of terroris."@en
schema:exampleOfWork<http://worldcat.org/entity/work/id/137561856>
schema:genre"Case studies"@en
schema:genre"Electronic books."@en
schema:genre"Case studies."@en
schema:inLanguage"en"
schema:name"Breaching the fortress wall understanding terrorist efforts to overcome defensive technologies"@en
schema:numberOfPages"153"
schema:publisher
schema:url<http://books.google.com/books?id=fUzlAAAAIAAJ>
schema:url<http://site.ebrary.com/id/10225503>
schema:url<http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=213900>
schema:url<http://www.jstor.org/stable/10.7249/MG481DHS>
schema:url<http://www.rand.org/content/dam/rand/pubs/monographs/2007/RAND_MG481.pdf>
schema:url
schema:url<http://www.myilibrary.com?id=118090>
schema:workExample

Content-negotiable representations

Cerrar ventana

Inicie una sesión con WorldCat 

¿No tienes una cuenta? Puede fácilmente crear una cuenta gratuita.