跳到内容
Breaching the fortress wall : understanding terrorist efforts to overcome defensive technologies 预览资料
关闭预览资料
正在查...

Breaching the fortress wall : understanding terrorist efforts to overcome defensive technologies

著者: Brian A Jackson; United States. Department of Homeland Security.; et al
出版商: Santa Monica, CA : RAND Homeland Security, 2007.
丛书: Rand Corporation monograph series.
版本/格式:   电子图书 : 文献 : 英语查看所有的版本和格式
数据库:WorldCat
提要:
The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to target groups? efforts and protect the public from the threat of terrorist violence. Terrorist organizations are  再读一些...
评估:

(尚未评估) 0 附有评论 - 争取成为第一个。

主题
更多类似这样的

 

在线查找

与资料的链接

在图书馆查找

&AllPage.SpinnerRetrieving; 正在查找有这资料的图书馆...

详细书目

类型/形式: Electronic books
Case studies
附加的形体格式: Print version:
Breaching the fortress wall.
Santa Monica, CA : RAND Homeland Security, 2007
(DLC) 2006001721
(OCoLC)63125906
材料类型: 文献, 互联网资源
文件类型: 互联网资源, 计算机文档
所有的著者/提供者: Brian A Jackson; United States. Department of Homeland Security.; et al
ISBN: 9780833042477 0833042475
OCLC号码: 183658196
注意: "Prepared for the Department of Homeland Security."
"MG-481-DHS"--P. [4] of cover.
描述: 1 online resource (xxviii, 153 p.) : ill., maps.
内容: Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One --
Introduction; Chapter Two --
Palestinian Terrorist Groups; Chapter Three --
Jemaah Islamiyah and Affiliated Groups; Chapter Four --
Liberation Tigers of Tamil Eelam; Chapter Five --
Provisional Irish Republican Army; Chapter Six --
Conclusions: Understanding Terrorists' Countertechnology Efforts; Appendix; Bibliography;
丛书名: Rand Corporation monograph series.
责任: Brian A. Jackson ... [et al.].

摘要:

Technology systems play a key role within a larger, integrated strategy to target groups' efforts and protect the public from the threat of terrorist violence. This study draws on relevant data from  再读一些...

评论

用户提供的评论
正在获取GoodReads评论...
正在检索DOGObooks的评论

标签

争取是第一个!
确认申请

你可能已经申请过这份资料。如果还是想申请,请选确认。

链接数据


<http://www.worldcat.org/oclc/183658196>
library:oclcnum"183658196"
library:placeOfPublication
library:placeOfPublication
owl:sameAs<info:oclcnum/183658196>
rdf:typeschema:Book
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
<http://id.worldcat.org/fast/1148123>
rdf:typeschema:Intangible
schema:name"Terrorism--Prevention"@en
schema:name"Terrorism--Prevention."@en
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:bookFormatschema:EBook
schema:contributor
<http://viaf.org/viaf/121741457>
rdf:typeschema:Organization
schema:name"United States. Department of Homeland Security."
schema:contributor
schema:datePublished"2007"
schema:description"Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One -- Introduction; Chapter Two -- Palestinian Terrorist Groups; Chapter Three -- Jemaah Islamiyah and Affiliated Groups; Chapter Four -- Liberation Tigers of Tamil Eelam; Chapter Five -- Provisional Irish Republican Army; Chapter Six -- Conclusions: Understanding Terrorists' Countertechnology Efforts; Appendix; Bibliography;"@en
schema:description"The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to target groups? efforts and protect the public from the threat of terrorist violence. Terrorist organizations are acutely aware of government efforts to deploy these systems and actively seek ways to evade or counteract them. This study draws on relevant data from the history of a variety of terroris."@en
schema:exampleOfWork<http://worldcat.org/entity/work/id/137561856>
schema:genre"Case studies"@en
schema:genre"Electronic books."@en
schema:genre"Case studies."@en
schema:inLanguage"en"
schema:name"Breaching the fortress wall understanding terrorist efforts to overcome defensive technologies"@en
schema:numberOfPages"153"
schema:publisher
schema:url<http://books.google.com/books?id=fUzlAAAAIAAJ>
schema:url<http://site.ebrary.com/id/10225503>
schema:url<http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=213900>
schema:url<http://www.jstor.org/stable/10.7249/MG481DHS>
schema:url<http://www.rand.org/content/dam/rand/pubs/monographs/2007/RAND_MG481.pdf>
schema:url
schema:url<http://www.myilibrary.com?id=118090>
schema:workExample

Content-negotiable representations

关闭窗口

请登入WorldCat 

没有张号吗?很容易就可以 建立免费的账号.