Coverart for item
The Resource Breaching the Fortress Wall : Understanding Terrorist Efforts to Overcome Defensive Technologies

Breaching the Fortress Wall : Understanding Terrorist Efforts to Overcome Defensive Technologies

Label
Breaching the Fortress Wall : Understanding Terrorist Efforts to Overcome Defensive Technologies
Title
Breaching the Fortress Wall
Title remainder
Understanding Terrorist Efforts to Overcome Defensive Technologies
Creator
Contributor
Subject
Genre
Language
eng
Summary
The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to target groups efforts and protect the public from the threat of terrorist violence. Terrorist organizations are acutely aware of government efforts to deploy these systems and actively seek ways to evade or counteract them. This study draws on relevant data from the history of a variety of terroris
Member of
Cataloging source
EBLCP
http://library.link/vocab/creatorDate
1972-
http://library.link/vocab/creatorName
Jackson, Brian A.
Dewey number
363.32572
Index
no index present
LC call number
  • HV6431.B737 2006
  • HV6431
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
  • Chalk, Peter
  • Cragin, R. Kim
Series statement
Rand Corporation monograph series
http://library.link/vocab/subjectName
  • National security
  • Security systems
  • Terrorism
  • Terrorism
  • Terrorism
  • War on Terrorism, 2001-2009
  • War on Terrorism (2001-2009)
  • National security
  • Security systems
  • Technology
  • Terrorism
  • Terrorism
Label
Breaching the Fortress Wall : Understanding Terrorist Efforts to Overcome Defensive Technologies
Instantiates
Publication
Bibliography note
Includes bibliographical references
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
mixed
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One -- Introduction; Chapter Two -- Palestinian Terrorist Groups; Chapter Three -- Jemaah Islamiyah and Affiliated Groups; Chapter Four -- Liberation Tigers of Tamil Eelam; Chapter Five -- Provisional Irish Republican Army; Chapter Six -- Conclusions: Understanding Terrorists' Countertechnology Efforts; Appendix; Bibliography
Control code
476119907
Dimensions
unknown
Extent
1 online resource (183 pages).
Form of item
online
Isbn
9780833042477
Media category
computer
Media MARC source
rdamedia
Media type code
c
Specific material designation
remote
System control number
(OCoLC)476119907
Label
Breaching the Fortress Wall : Understanding Terrorist Efforts to Overcome Defensive Technologies
Publication
Bibliography note
Includes bibliographical references
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
mixed
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One -- Introduction; Chapter Two -- Palestinian Terrorist Groups; Chapter Three -- Jemaah Islamiyah and Affiliated Groups; Chapter Four -- Liberation Tigers of Tamil Eelam; Chapter Five -- Provisional Irish Republican Army; Chapter Six -- Conclusions: Understanding Terrorists' Countertechnology Efforts; Appendix; Bibliography
Control code
476119907
Dimensions
unknown
Extent
1 online resource (183 pages).
Form of item
online
Isbn
9780833042477
Media category
computer
Media MARC source
rdamedia
Media type code
c
Specific material designation
remote
System control number
(OCoLC)476119907

Library Locations

    • Ellis LibraryBorrow it
      1020 Lowry Street, Columbia, MO, 65201, US
      38.944491 -92.326012
Processing Feedback ...