doorgaan naar inhoud
Breaching the fortress wall : understanding terrorist efforts to overcome defensive technologies Voorbeeldweergave van dit item
SluitenVoorbeeldweergave van dit item
Bezig met controle...

Breaching the fortress wall : understanding terrorist efforts to overcome defensive technologies

Auteur: Brian A Jackson; United States. Department of Homeland Security.; et al
Uitgever: Santa Monica, CA : RAND Homeland Security, 2007.
Serie: Rand Corporation monograph series.
Editie/Formaat:   eBoek : Document : EngelsAlle edities en materiaalsoorten bekijken.
Database:WorldCat
Samenvatting:
The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to target groups? efforts and protect the public from the threat of terrorist violence. Terrorist organizations are  Meer lezen...
Beoordeling:

(nog niet beoordeeld) 0 met beoordelingen - U bent de eerste

Onderwerpen
Meer in deze trant

 

Zoeken naar een online exemplaar

Links naar dit item

Zoeken naar een in de bibliotheek beschikbaar exemplaar

&AllPage.SpinnerRetrieving; Bibliotheken met dit item worden gezocht…

Details

Genre/Vorm: Electronic books
Case studies
Aanvullende fysieke materiaalsoort: Print version:
Breaching the fortress wall.
Santa Monica, CA : RAND Homeland Security, 2007
(DLC) 2006001721
(OCoLC)63125906
Genre: Document, Internetbron
Soort document: Internetbron, Computerbestand
Alle auteurs / medewerkers: Brian A Jackson; United States. Department of Homeland Security.; et al
ISBN: 9780833042477 0833042475
OCLC-nummer: 183658196
Opmerkingen: "Prepared for the Department of Homeland Security."
"MG-481-DHS"--P. [4] of cover.
Beschrijving: 1 online resource (xxviii, 153 p.) : ill., maps.
Inhoud: Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One --
Introduction; Chapter Two --
Palestinian Terrorist Groups; Chapter Three --
Jemaah Islamiyah and Affiliated Groups; Chapter Four --
Liberation Tigers of Tamil Eelam; Chapter Five --
Provisional Irish Republican Army; Chapter Six --
Conclusions: Understanding Terrorists' Countertechnology Efforts; Appendix; Bibliography;
Serietitel: Rand Corporation monograph series.
Verantwoordelijkheid: Brian A. Jackson ... [et al.].

Fragment:

Technology systems play a key role within a larger, integrated strategy to target groups' efforts and protect the public from the threat of terrorist violence. This study draws on relevant data from  Meer lezen...

Beoordelingen

Beoordelingen door gebruikers
Beoordelingen van GoodReads worden opgehaald...
Bezig met opvragen DOGObooks-reviews...

Tags

U bent de eerste.
Bevestig deze aanvraag

Misschien heeft u dit item reeds aangevraagd. Selecteer a.u.b. Ok als u toch wilt doorgaan met deze aanvraag.

Gekoppelde data


<http://www.worldcat.org/oclc/183658196>
library:oclcnum"183658196"
library:placeOfPublication
library:placeOfPublication
owl:sameAs<info:oclcnum/183658196>
rdf:typeschema:Book
rdfs:seeAlso
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
rdf:typeschema:Organization
schema:name"War on Terrorism (2001-2009)"
schema:about
rdf:typeschema:Organization
schema:name"War on Terrorism (2001-2009)"
schema:about
schema:about
schema:about
schema:about
schema:about
rdf:typeschema:Intangible
schema:name"POLITICAL SCIENCE--Political Freedom & Security--Terrorism."
schema:about
rdf:typeschema:Intangible
schema:name"POLITICAL SCIENCE / Terrorism"
schema:about
schema:about
schema:about
schema:about
schema:about
schema:bookFormatschema:EBook
schema:contributor
schema:contributor
schema:datePublished"2007"
schema:description"Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One -- Introduction; Chapter Two -- Palestinian Terrorist Groups; Chapter Three -- Jemaah Islamiyah and Affiliated Groups; Chapter Four -- Liberation Tigers of Tamil Eelam; Chapter Five -- Provisional Irish Republican Army; Chapter Six -- Conclusions: Understanding Terrorists' Countertechnology Efforts; Appendix; Bibliography;"
schema:description"The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to target groups? efforts and protect the public from the threat of terrorist violence. Terrorist organizations are acutely aware of government efforts to deploy these systems and actively seek ways to evade or counteract them. This study draws on relevant data from the history of a variety of terroris."
schema:exampleOfWork<http://worldcat.org/entity/work/id/137561856>
schema:genre"Case studies"
schema:genre"Case studies."
schema:inLanguage"en"
schema:name"Breaching the fortress wall understanding terrorist efforts to overcome defensive technologies"
schema:numberOfPages"153"
schema:publisher
schema:url<http://www.rand.org/pubs/monographs/2007/RAND_MG481.pdf>
schema:url<http://books.google.com/books?id=fUzlAAAAIAAJ>
schema:url<http://site.ebrary.com/id/10225503>
schema:url<http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=213900>
schema:url<http://www.jstor.org/stable/10.7249/MG481DHS>
schema:url<http://www.myilibrary.com?id=118090>
schema:workExample
schema:workExample

Content-negotiable representations

Venster sluiten

Meld u aan bij WorldCat 

Heeft u geen account? U kunt eenvoudig een nieuwe gratis account aanmaken.