passa ai contenuti
Breaching the fortress wall : understanding terrorist efforts to overcome defensive technologies Anteprima di questo documento
ChiudiAnteprima di questo documento
Stiamo controllando…

Breaching the fortress wall : understanding terrorist efforts to overcome defensive technologies

Autore: Brian A Jackson; United States. Department of Homeland Security.; et al
Editore: Santa Monica, CA : RAND Homeland Security, 2007.
Serie: Rand Corporation monograph series.
Edizione/Formato:   eBook : Document : EnglishVedi tutte le edizioni e i formati
Banca dati:WorldCat
Sommario:
The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to target groups? efforts and protect the public from the threat of terrorist violence. Terrorist organizations are  Per saperne di più…
Voto:

(non ancora votato) 0 con commenti - Diventa il primo.

Soggetti
Altri come questo

 

Trova una copia online

Collegamenti a questo documento

Trova una copia in biblioteca

&AllPage.SpinnerRetrieving; Stiamo ricercando le biblioteche che possiedono questo documento…

Dettagli

Genere/forma: Electronic books
Case studies
Informazioni aggiuntive sul formato: Print version:
Breaching the fortress wall.
Santa Monica, CA : RAND Homeland Security, 2007
(DLC) 2006001721
(OCoLC)63125906
Tipo materiale: Document, Risorsa internet
Tipo documento: Internet Resource, Computer File
Tutti gli autori / Collaboratori: Brian A Jackson; United States. Department of Homeland Security.; et al
ISBN: 9780833042477 0833042475
Numero OCLC: 183658196
Note: "Prepared for the Department of Homeland Security."
"MG-481-DHS"--P. [4] of cover.
Descrizione: 1 online resource (xxviii, 153 p.) : ill., maps.
Contenuti: Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One --
Introduction; Chapter Two --
Palestinian Terrorist Groups; Chapter Three --
Jemaah Islamiyah and Affiliated Groups; Chapter Four --
Liberation Tigers of Tamil Eelam; Chapter Five --
Provisional Irish Republican Army; Chapter Six --
Conclusions: Understanding Terrorists' Countertechnology Efforts; Appendix; Bibliography;
Titolo della serie: Rand Corporation monograph series.
Responsabilità: Brian A. Jackson ... [et al.].

Abstract:

Technology systems play a key role within a larger, integrated strategy to target groups' efforts and protect the public from the threat of terrorist violence. This study draws on relevant data from  Per saperne di più…

Commenti

Commenti degli utenti
Recuperando commenti GoodReads…
Stiamo recuperando commenti DOGObooks

Etichette

Diventa il primo.
Conferma questa richiesta

Potresti aver già richiesto questo documento. Seleziona OK se si vuole procedere comunque con questa richiesta.

Dati collegati


<http://www.worldcat.org/oclc/183658196>
library:oclcnum"183658196"
library:placeOfPublication
library:placeOfPublication
rdf:typeschema:MediaObject
rdf:typeschema:Book
rdf:valueUnknown value: dct
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:bookFormatschema:EBook
schema:contributor
<http://viaf.org/viaf/121741457>
rdf:typeschema:Organization
schema:name"United States. Department of Homeland Security."
schema:contributor
schema:datePublished"2007"
schema:description"Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One -- Introduction; Chapter Two -- Palestinian Terrorist Groups; Chapter Three -- Jemaah Islamiyah and Affiliated Groups; Chapter Four -- Liberation Tigers of Tamil Eelam; Chapter Five -- Provisional Irish Republican Army; Chapter Six -- Conclusions: Understanding Terrorists' Countertechnology Efforts; Appendix; Bibliography;"@en
schema:description"The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to target groups? efforts and protect the public from the threat of terrorist violence. Terrorist organizations are acutely aware of government efforts to deploy these systems and actively seek ways to evade or counteract them. This study draws on relevant data from the history of a variety of terroris."@en
schema:exampleOfWork<http://worldcat.org/entity/work/id/137561856>
schema:genre"Case studies"@en
schema:genre"Electronic books"@en
schema:inLanguage"en"
schema:isPartOf
schema:name"Breaching the fortress wall understanding terrorist efforts to overcome defensive technologies"@en
schema:numberOfPages"153"
schema:publication
schema:publisher
schema:url<http://books.google.com/books?id=fUzlAAAAIAAJ>
schema:url<http://site.ebrary.com/id/10225503>
schema:url<http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=213900>
schema:url<http://www.jstor.org/stable/10.7249/MG481DHS>
schema:url<http://www.rand.org/content/dam/rand/pubs/monographs/2007/RAND_MG481.pdf>
schema:url<http://www.myilibrary.com?id=118090>
schema:workExample
wdrs:describedby

Content-negotiable representations

Chiudi finestra

Per favore entra in WorldCat 

Non hai un account? Puoi facilmente crearne uno gratuito.