pular para conteúdo
Breaching the fortress wall : understanding terrorist efforts to overcome defensive technologies Ver prévia deste item
FecharVer prévia deste item
Checando...

Breaching the fortress wall : understanding terrorist efforts to overcome defensive technologies

Autor: Brian A Jackson; United States. Department of Homeland Security.; et al
Editora: Santa Monica, CA : RAND Homeland Security, 2007.
Séries: Rand Corporation monograph series.
Edição/Formato   e-book : Documento : InglêsVer todas as edições e formatos
Base de Dados:WorldCat
Resumo:
The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to target groups? efforts and protect the public from the threat of terrorist violence. Terrorist organizations are  Ler mais...
Classificação:

(ainda não classificado) 0 com críticas - Seja o primeiro.

Assuntos
Mais como este

 

Encontrar uma cópia on-line

Links para este item

Encontrar uma cópia na biblioteca

&AllPage.SpinnerRetrieving; Encontrando bibliotecas que possuem este item...

Detalhes

Gênero/Forma: Electronic books
Case studies
Formato Físico Adicional: Print version:
Breaching the fortress wall.
Santa Monica, CA : RAND Homeland Security, 2007
(DLC) 2006001721
(OCoLC)63125906
Tipo de Material: Documento, Recurso Internet
Tipo de Documento: Recurso Internet, Arquivo de Computador
Todos os Autores / Contribuintes: Brian A Jackson; United States. Department of Homeland Security.; et al
ISBN: 9780833042477 0833042475
Número OCLC: 183658196
Notas: "Prepared for the Department of Homeland Security."
"MG-481-DHS"--P. [4] of cover.
Descrição: 1 online resource (xxviii, 153 p.) : ill., maps.
Conteúdos: Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One --
Introduction; Chapter Two --
Palestinian Terrorist Groups; Chapter Three --
Jemaah Islamiyah and Affiliated Groups; Chapter Four --
Liberation Tigers of Tamil Eelam; Chapter Five --
Provisional Irish Republican Army; Chapter Six --
Conclusions: Understanding Terrorists' Countertechnology Efforts; Appendix; Bibliography;
Título da Série: Rand Corporation monograph series.
Responsabilidade: Brian A. Jackson ... [et al.].

Resumo:

Technology systems play a key role within a larger, integrated strategy to target groups' efforts and protect the public from the threat of terrorist violence. This study draws on relevant data from  Ler mais...

Críticas

Críticas contribuídas por usuários
Recuperando críticas GoodReas...
Recuperando comentários DOGObooks

Etiquetas

Seja o primeiro.
Confirmar esta solicitação

Você já pode ter solicitado este item. Por favor, selecione Ok se gostaria de proceder com esta solicitação de qualquer forma.

Dados Ligados


<http://www.worldcat.org/oclc/183658196>
library:oclcnum"183658196"
library:placeOfPublication
library:placeOfPublication
owl:sameAs<info:oclcnum/183658196>
rdf:typeschema:Book
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
<http://id.worldcat.org/fast/1148123>
rdf:typeschema:Intangible
schema:name"Terrorism--Prevention"@en
schema:name"Terrorism--Prevention."@en
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:bookFormatschema:EBook
schema:contributor
<http://viaf.org/viaf/121741457>
rdf:typeschema:Organization
schema:name"United States. Department of Homeland Security."
schema:contributor
schema:datePublished"2007"
schema:description"Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One -- Introduction; Chapter Two -- Palestinian Terrorist Groups; Chapter Three -- Jemaah Islamiyah and Affiliated Groups; Chapter Four -- Liberation Tigers of Tamil Eelam; Chapter Five -- Provisional Irish Republican Army; Chapter Six -- Conclusions: Understanding Terrorists' Countertechnology Efforts; Appendix; Bibliography;"@en
schema:description"The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to target groups? efforts and protect the public from the threat of terrorist violence. Terrorist organizations are acutely aware of government efforts to deploy these systems and actively seek ways to evade or counteract them. This study draws on relevant data from the history of a variety of terroris."@en
schema:exampleOfWork<http://worldcat.org/entity/work/id/137561856>
schema:genre"Case studies"@en
schema:genre"Electronic books."@en
schema:genre"Case studies."@en
schema:inLanguage"en"
schema:name"Breaching the fortress wall understanding terrorist efforts to overcome defensive technologies"@en
schema:numberOfPages"153"
schema:publisher
schema:url<http://books.google.com/books?id=fUzlAAAAIAAJ>
schema:url<http://site.ebrary.com/id/10225503>
schema:url<http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=213900>
schema:url<http://www.jstor.org/stable/10.7249/MG481DHS>
schema:url<http://www.rand.org/content/dam/rand/pubs/monographs/2007/RAND_MG481.pdf>
schema:url
schema:url<http://www.myilibrary.com?id=118090>
schema:workExample

Content-negotiable representations

Close Window

Por favor, conecte-se ao WorldCat 

Não tem uma conta? Você pode facilmente criar uma conta gratuita.