Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    almafu_BV014284414
    Format: X, 448 S. : graph. Darst.
    Edition: 1. publ.
    ISBN: 0-275-97427-8
    Content: New threats require new thinking. State attacks involving long-range missiles or conventional military forces are not the only threat to the U.S. homeland. Covert attacks by state actors, state use of proxies, independent terrorist and extremist attacks by foreign groups or individuals--and even by residents of the United States--are significant issues for future U.S. security. In this comprehensive work, Cordesman offers a range of recommendations, from reevaluating what constitutes a threat and bolstering homeland defense measures, to improving resource allocation and sharpening intelligence. Annotation. Cordesman (Middle East program, Center for Strategic and International Studies) argues that homeland defense must respond to a constantly changing threat, and especially to the kind that may be impossible to predict, and which may emerge as a pattern of attack in the years to come. He discusses such aspects as assessing risks, prioritizing threats, types of attacks, creating a homeland defense capability, and federal cooperation. He does not provide an index.
    Language: English
    Subjects: Political Science
    RVK:
    Keywords: Sicherheitspolitik ; Massenvernichtungswaffe ; Terrorismus ; Bekämpfung
    URL: Inhaltsverzeichnis  (Kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Westport, Conn : Praeger | London : Bloomsbury Publishing
    UID:
    gbv_1891597825
    Format: 1 Online-Ressource (x, 448 p) , 24 cm
    ISBN: 9798216024453
    Note: Includes bibliographical references , Barrierefreier Inhalt: Compliant with Level AA of the Web Content Accessibility Guidelines. Content is displayed as HTML full text which can easily be resized or read with assistive technology, with mark-up that allows screen readers and keyboard-only users to navigate easily
    Additional Edition: ISBN 9798216133254
    Additional Edition: ISBN 9780313361197
    Additional Edition: ISBN 9780313006906
    Additional Edition: ISBN 9780275974275
    Additional Edition: ISBN 0275974278
    Additional Edition: Erscheint auch als ISBN 0275974278
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Westport : Greenwood Publishing Group, Incorporated
    UID:
    gbv_1696735173
    Format: 1 online resource (455 pages)
    ISBN: 9780313006906
    Content: Intro -- Contents -- Acknowledgments -- Chapter 1 The Changing Face of Asymmetric Warfare and Terrorism -- Chapter 2 Risk Assessment: Planning for "Non- patterns" and Potential Risk -- Chapter 3 Threat Prioritization: Seeking to Identify Current and Future Threats -- Chapter 4 Types of Attack: Determining Future Methods of Attack and the Needed Response -- Chapter 5 Threat Assessment and Prioritization: Identifying Threats -- Chapter 6 U. S. Government Efforts to Create a Homeland Defense Capability -- Chapter 7 Federal Efforts by Department and Agency -- Chapter 8 Federal, State, and Local Cooperation -- Chapter 9 How Other Nations Deal with These Threats -- Chapter 10 Lessons from Recent Major Commissions on Terrorism -- Chapter 11 Conclusions and Recommendations -- About the Author.
    Note: Description based on publisher supplied metadata and other sources
    Additional Edition: ISBN 9780275974275
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9780275974275
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 9780275973278?
Did you mean 9780275974237?
Did you mean 9780275974305?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages