feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    gbv_1877793140
    Format: 1 Online-Ressource
    ISBN: 9780833042477 , 9780833039149
    Content: Technology systems play a key role within a larger, integrated strategy to target groups' efforts and protect the public from the threat of terrorist violence. This study draws on relevant data from the history of a variety of terrorist conflicts to understand terrorists' counter-technology efforts. Fully exploring adversaries' counter-technology behaviors can help make the best choices to protect from the nation from the threat of terrorism
    Note: English
    Language: Undetermined
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    gbv_1008650048
    Format: 1 Online-Ressource (xxviii, 153 pages)
    ISBN: 9780833039149 , 0833042475 , 0833039148 , 9780833042477
    Series Statement: Rand Corporation monograph series
    Content: The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to target groups? efforts and protect the public from the threat of terrorist violence. Terrorist organizations are acutely aware of government efforts to deploy these systems and actively seek ways to evade or counteract them. This study draws on relevant data from the history of a variety of terroris
    Content: The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to target groups? efforts and protect the public from the threat of terrorist violence. Terrorist organizations are acutely aware of government efforts to deploy these systems and actively seek ways to evade or counteract them. This study draws on relevant data from the history of a variety of terroris
    Note: "MG-481-DHS"--Page 4 of cover , "Prepared for the Department of Homeland Security , Includes bibliographical references (pages 139-153)
    Additional Edition: ISBN 9780833039149
    Additional Edition: ISBN 0833039148
    Additional Edition: Druck-Ausgabe
    Additional Edition: Print version Breaching the fortress wall Santa Monica, CA : RAND Homeland Security, 2007
    Language: English
    Keywords: Electronic books
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    edoccha_9958279005102883
    Format: 1 online resource (183 p.)
    ISBN: 1-281-18090-4 , 9786611180904 , 0-8330-4247-5
    Series Statement: Rand Corporation monograph series
    Content: The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to target groups' efforts and protect the public from the threat of terrorist violence. Terrorist organizations are acutely aware of government efforts to deploy these systems and actively seek ways to evade or counteract them. This study draws on relevant data from the history of a variety of terroris
    Note: "Prepared for the Department of Homeland Security." , "MG-481-DHS". , Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One - Introduction; Defensive Technologies and the Effort to CombatTerrorism; Terrorist Efforts to Overcome Defensive Technologies; About the Study; About This Monograph; Chapter Two - Palestinian Terrorist Groups; Introduction; Information Acquisition and Management; Preventive Action; Denial; Response; Conclusion; Chapter Three - Jemaah Islamiyah and Affiliated Groups; Introduction; Information Acquisition and Management; Preventive Action; Denial; Investigation; Conclusion , Chapter Four - Liberation Tigers of Tamil EelamIntroduction; Information Acquisition and Management; Denial; Conclusion; Chapter Five - Provisional Irish Republican Army; Introduction; Information Acquisition and Management; Preventive Action; Denial; Response; Investigation; Conclusion; Chapter Six - Conclusions: Understanding Terrorists' Countertechnology Efforts; Terrorist Strategies for Countering DefensiveTechnologies; Transferability of Terrorist Countertechnology Strategies; Implications of Terrorist Countertechnology Activities forHomeland Security Efforts , In Conclusion:The Role of Technology in Combating TerrorismAppendix - Prominent Acts of LTTE Suicide Terrorism, 1987-2002; Bibliography , English
    Additional Edition: ISBN 0-8330-3914-8
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    edocfu_9958279005102883
    Format: 1 online resource (183 p.)
    ISBN: 1-281-18090-4 , 9786611180904 , 0-8330-4247-5
    Series Statement: Rand Corporation monograph series
    Content: The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to target groups' efforts and protect the public from the threat of terrorist violence. Terrorist organizations are acutely aware of government efforts to deploy these systems and actively seek ways to evade or counteract them. This study draws on relevant data from the history of a variety of terroris
    Note: "Prepared for the Department of Homeland Security." , "MG-481-DHS". , Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One - Introduction; Defensive Technologies and the Effort to CombatTerrorism; Terrorist Efforts to Overcome Defensive Technologies; About the Study; About This Monograph; Chapter Two - Palestinian Terrorist Groups; Introduction; Information Acquisition and Management; Preventive Action; Denial; Response; Conclusion; Chapter Three - Jemaah Islamiyah and Affiliated Groups; Introduction; Information Acquisition and Management; Preventive Action; Denial; Investigation; Conclusion , Chapter Four - Liberation Tigers of Tamil EelamIntroduction; Information Acquisition and Management; Denial; Conclusion; Chapter Five - Provisional Irish Republican Army; Introduction; Information Acquisition and Management; Preventive Action; Denial; Response; Investigation; Conclusion; Chapter Six - Conclusions: Understanding Terrorists' Countertechnology Efforts; Terrorist Strategies for Countering DefensiveTechnologies; Transferability of Terrorist Countertechnology Strategies; Implications of Terrorist Countertechnology Activities forHomeland Security Efforts , In Conclusion:The Role of Technology in Combating TerrorismAppendix - Prominent Acts of LTTE Suicide Terrorism, 1987-2002; Bibliography , English
    Additional Edition: ISBN 0-8330-3914-8
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    almahu_9949577240002882
    Format: 1 online resource (183 p.)
    ISBN: 1-281-18090-4 , 9786611180904 , 0-8330-4247-5
    Series Statement: Rand Corporation monograph series
    Content: The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to target groups' efforts and protect the public from the threat of terrorist violence. Terrorist organizations are acutely aware of government efforts to deploy these systems and actively seek ways to evade or counteract them. This study draws on relevant data from the history of a variety of terroris
    Note: "Prepared for the Department of Homeland Security." , "MG-481-DHS". , Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One - Introduction; Defensive Technologies and the Effort to CombatTerrorism; Terrorist Efforts to Overcome Defensive Technologies; About the Study; About This Monograph; Chapter Two - Palestinian Terrorist Groups; Introduction; Information Acquisition and Management; Preventive Action; Denial; Response; Conclusion; Chapter Three - Jemaah Islamiyah and Affiliated Groups; Introduction; Information Acquisition and Management; Preventive Action; Denial; Investigation; Conclusion , Chapter Four - Liberation Tigers of Tamil EelamIntroduction; Information Acquisition and Management; Denial; Conclusion; Chapter Five - Provisional Irish Republican Army; Introduction; Information Acquisition and Management; Preventive Action; Denial; Response; Investigation; Conclusion; Chapter Six - Conclusions: Understanding Terrorists' Countertechnology Efforts; Terrorist Strategies for Countering DefensiveTechnologies; Transferability of Terrorist Countertechnology Strategies; Implications of Terrorist Countertechnology Activities forHomeland Security Efforts , In Conclusion:The Role of Technology in Combating TerrorismAppendix - Prominent Acts of LTTE Suicide Terrorism, 1987-2002; Bibliography , English
    Additional Edition: ISBN 0-8330-3914-8
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages