跳至内容
Breaching the fortress wall : understanding terrorist efforts to overcome defensive technologies 線上預覽
關閉線上預覽
正在查...

Breaching the fortress wall : understanding terrorist efforts to overcome defensive technologies

作者: Brian A Jackson; United States. Department of Homeland Security.; et al
出版商: Santa Monica, CA : RAND Homeland Security, 2007.
叢書: Rand Corporation monograph series.
版本/格式:   電子書 : 文獻 : 英語所有版本和格式的總覽
資料庫:WorldCat
提要:
The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to target groups? efforts and protect the public from the threat of terrorist violence. Terrorist organizations are  再讀一些...
評定級別:

(尚未評分) 0 附有評論 - 成爲第一個。

主題
更多類似這樣的

 

在線上查詢

與資料的連結

在圖書館查詢

&AllPage.SpinnerRetrieving; 正在查詢有此資料的圖書館...

詳細書目

類型/形式: Electronic books
Case studies
其他的實體格式: Print version:
Breaching the fortress wall.
Santa Monica, CA : RAND Homeland Security, 2007
(DLC) 2006001721
(OCoLC)63125906
資料類型: 文獻, 網際網路資源
文件類型: 網路資源, 電腦資料
所有的作者/貢獻者: Brian A Jackson; United States. Department of Homeland Security.; et al
ISBN: 9780833042477 0833042475
OCLC系統控制編碼: 183658196
注意: "Prepared for the Department of Homeland Security."
"MG-481-DHS"--P. [4] of cover.
描述: 1 online resource (xxviii, 153 p.) : ill., maps.
内容: Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One --
Introduction; Chapter Two --
Palestinian Terrorist Groups; Chapter Three --
Jemaah Islamiyah and Affiliated Groups; Chapter Four --
Liberation Tigers of Tamil Eelam; Chapter Five --
Provisional Irish Republican Army; Chapter Six --
Conclusions: Understanding Terrorists' Countertechnology Efforts; Appendix; Bibliography;
叢書名: Rand Corporation monograph series.
責任: Brian A. Jackson ... [et al.].

摘要:

Technology systems play a key role within a larger, integrated strategy to target groups' efforts and protect the public from the threat of terrorist violence. This study draws on relevant data from  再讀一些...

評論

讀者提供的評論
正在擷取GoodReads評論...
正在擷取DOGObooks的評論

標籤

成爲第一個
確認申請

你可能已經申請過這份資料。若還是想申請,請選確認。

連結資料


<http://www.worldcat.org/oclc/183658196>
library:oclcnum"183658196"
library:placeOfPublication
library:placeOfPublication
owl:sameAs<info:oclcnum/183658196>
rdf:typeschema:Book
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
<http://id.worldcat.org/fast/1148123>
rdf:typeschema:Intangible
schema:name"Terrorism--Prevention"@en
schema:name"Terrorism--Prevention."@en
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:bookFormatschema:EBook
schema:contributor
<http://viaf.org/viaf/121741457>
rdf:typeschema:Organization
schema:name"United States. Department of Homeland Security."
schema:contributor
schema:datePublished"2007"
schema:description"Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One -- Introduction; Chapter Two -- Palestinian Terrorist Groups; Chapter Three -- Jemaah Islamiyah and Affiliated Groups; Chapter Four -- Liberation Tigers of Tamil Eelam; Chapter Five -- Provisional Irish Republican Army; Chapter Six -- Conclusions: Understanding Terrorists' Countertechnology Efforts; Appendix; Bibliography;"@en
schema:description"The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to target groups? efforts and protect the public from the threat of terrorist violence. Terrorist organizations are acutely aware of government efforts to deploy these systems and actively seek ways to evade or counteract them. This study draws on relevant data from the history of a variety of terroris."@en
schema:exampleOfWork<http://worldcat.org/entity/work/id/137561856>
schema:genre"Case studies"@en
schema:genre"Electronic books."@en
schema:genre"Case studies."@en
schema:inLanguage"en"
schema:name"Breaching the fortress wall understanding terrorist efforts to overcome defensive technologies"@en
schema:numberOfPages"153"
schema:publisher
schema:url<http://books.google.com/books?id=fUzlAAAAIAAJ>
schema:url<http://site.ebrary.com/id/10225503>
schema:url<http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=213900>
schema:url<http://www.jstor.org/stable/10.7249/MG481DHS>
schema:url<http://www.rand.org/content/dam/rand/pubs/monographs/2007/RAND_MG481.pdf>
schema:url
schema:url<http://www.myilibrary.com?id=118090>
schema:workExample

Content-negotiable representations

關閉視窗

請登入WorldCat 

没有帳號嗎?你可很容易的 建立免費的帳號.