Terrorism in the twenty-first century:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Upper Saddle River, N.J.
Pearson/Prentice Hall
2006
|
Ausgabe: | 4. ed. |
Schlagworte: | |
Online-Zugang: | Table of contents Inhaltsverzeichnis |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | xii, 334 S. Ill. |
ISBN: | 013193063X |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV021788710 | ||
003 | DE-604 | ||
005 | 20180416 | ||
007 | t | ||
008 | 061030s2006 xxua||| |||| 00||| eng d | ||
010 | |a 2005018659 | ||
020 | |a 013193063X |9 0-13-193063-X | ||
035 | |a (OCoLC)60835336 | ||
035 | |a (DE-599)BVBBV021788710 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-12 | ||
050 | 0 | |a HV6431 | |
050 | 0 | |a HV6431.C472 2006 | |
082 | 0 | |a 303.6/25 | |
084 | |a MD 8920 |0 (DE-625)122569: |2 rvk | ||
100 | 1 | |a Combs, Cindy C. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Terrorism in the twenty-first century |c Cindy C. Combs |
246 | 1 | 3 | |a Terrorism in the 21st century |
250 | |a 4. ed. | ||
264 | 1 | |a Upper Saddle River, N.J. |b Pearson/Prentice Hall |c 2006 | |
300 | |a xii, 334 S. |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
648 | 7 | |a Geschichte |2 gnd |9 rswk-swf | |
648 | 7 | |a Prognose |2 gnd |9 rswk-swf | |
650 | 4 | |a Terrorismus | |
650 | 4 | |a Terrorism | |
650 | 4 | |a Terrorism |x Forecasting | |
650 | 0 | 7 | |a Prognose |0 (DE-588)4047390-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Terrorismus |0 (DE-588)4059534-1 |2 gnd |9 rswk-swf |
655 | 7 | |8 1\p |0 (DE-588)4066724-8 |a Wörterbuch |2 gnd-content | |
689 | 0 | 0 | |a Terrorismus |0 (DE-588)4059534-1 |D s |
689 | 0 | 1 | |a Prognose |A z |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Terrorismus |0 (DE-588)4059534-1 |D s |
689 | 1 | 1 | |a Prognose |0 (DE-588)4047390-9 |D s |
689 | 1 | |8 2\p |5 DE-604 | |
689 | 2 | 0 | |a Terrorismus |0 (DE-588)4059534-1 |D s |
689 | 2 | 1 | |a Geschichte |A z |
689 | 2 | |8 3\p |5 DE-604 | |
856 | 4 | |u http://www.loc.gov/catdir/toc/ecip0515/2005018659.html |3 Table of contents | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015001393&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-015001393 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 3\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804135697838243840 |
---|---|
adam_text | Contents
Preface xi
Introduction 1
Part I Terrorism in Perspective
1 An Idea Whose Time Has Come? 4
Modem Definitions of an Old Concept 8
Crucial Components of Terrorism 10
Typologies of Terrorism: Useful Tools 16
Using Tactics as Labels 18
Conclusions 19
Evaluation 19
Suggested Readings 20
Notes 20
2 Not a Modern Phenomenon 22
Tyrannicide: To Go Too Fast 24
State Terrorism 26
Guerrilla Warfare: Selective Violence 26
Cyclical Nature of Terror 28
Conclusions 31
Evaluation 34
Suggested Readings 35
Notes 35
V
vi Contents
3 Ideology and Terrorism: Rights from Wrongs? 36
The Rationalization of Violence 37
Rebellion and the Right of Self Determination 40
Terrorist Beliefs and Images 44
Causes of the Left and Right 46
Conclusions 50
Evaluation 50
Suggested Readings 51
Notes 51
Part II Who Are the Terrorists?
4 Criminals or Crusaders? 53
Profile of a Terrorist 5 3
Can We Generalize About a Typical Terrorist? 57
Terrorism Is Different Today 63
Trends in Terrorist Recruitment and Membership 65
Conclusions 72
Evaluation 73
Suggested Readings 74
Notes 74
5 Terrorism by the State 75
Internal Terrorism: The Beast That Lurks Within 76
The Continuing Reality of State Terror 81
International Efforts to Restrict Internal State Terrorism 82
Terrorism as an Instrument of Foreign Policy: Waging War by Proxy 85
Reluctant Bedfellows: The Arms Bazaar 88
Weapons of Mass Destruction on the Arms Bazaar 89
Silent Partners: Waging Subtle War 90
Terrorist Supported States 95
Conclusions 97
Evaluation 97
Suggested Readings 98
Notes 98
O Terrorism, Inc. 100
Networking 100
Shared Strategic Planning 101
Terrorism Is Big Business 103
Contents vii
The Internationalization of Terrorism 112
The Network and Netwar 114
Narcoterrorism 116
Conclusions 118
Evaluation 120
Suggested Readings 121
Notes 122
Part III How Do They Operate?
7 Terrorist Training 123
The How Questions 123
Training Sites 124
Training Topics: What Do They Learn at Camp? 126
Potential for Destruction: A Terrorist s Arsenal 135
Terrorist Tactics 142
Phases of a Terrorist Incident 149
Evaluation 151
Suggested Readings 152
Notes 152
8 The Media: A Weapon for Both Sides? 153
Propaganda by the Deed 153
Legal Issue of the Right of Access 155
Censorship: The Ugly Word 157
Complicity: A Very Serious Charge 161
Terrorist Goals Regarding Media 165
Government Goals Regarding Media 167
Media Goals in Terrorist Events 168
Conclusions 170
Evaluation 171
Suggested Readings 172
Notes 173
9 Domestic Terrorism in the United States 174
Historical Roots in the United States 174
Conceptualizing Domestic Terrorism in the United States 177
Cyberterrorism 193
Conclusions 194
Evaluation 196
Suggested Readings 197
Notes 198
viii Contents
Part IV Responses to Terrorism
10 Legal Perspectives on Terrorism 199
Terrorism Is a Crime 199
Laws of War 202
Piracy of Air and Sea 207
Protection of Diplomatic Personnel and Heads of State 211
Regional Legal Efforts to Prevent or Punish Terrorism 212
Summary: International Protection of the Innocent against
Specific Crimes 214
Is Terrorism a Political Crime? 215
United Nations and the War on Terrorism 217
Conclusions 219
Evaluation 220
Suggested Readings 221
Notes 222
11 Counterterrorism: The Use of Special Forces 224
Nations without Defenses 225
Strike Forces: A First Line of Defense? 225
Too Many U.S. Options? 232
Conclusions 240
Evaluation 241
Suggested Readings 241
Notes 242
12 Terrorism, Intelligence, and the Law 243
Legal Initiatives to Counter Terrorism 243
Investigation: The Intelligence Initiative 252
Governments Use Investigation and Intelligence 256
Intelligence Gathering and Counterintelligence by Terrorists 259
Conclusions 260
Evaluation 260
Suggested Readings 262
Notes 262
13 Security Measures: A Frail Defense 264
Three Facets of Security 265
Airport Security in the United States 268
Impact of September 11 Attacks on Airport Security 271
The Costs of Security 273
Protecting Public Transportation 275
Contents ix
Preventive Security 277
Threat Assessment: How Do You Know When You Are at Risk? 278
Conclusions 279
Evaluation 280
Suggested Readings 281
Notes 281
Part V Current Trends and Future Prospects
14 The New Terrorist Threat: Weapons of Mass
Destruction 283
Context of the Threat 283
Historical Use of Weapons of Mass Destruction 284
Types of Weapons of Mass Destruction Available Today 287
Access to and Use of Weapons of Mass Destruction 296
Conclusions 300
Evaluation 301
Suggested Readings 302
Notes 303
15 Future Trends 304
A War on Terrorism 304
Positive Outcomes of the September 11 Attacks 306
Dealing with Weapons of Mass Destruction 308
Trends in Terrorism 310
Impact of the Generational Difference 311
Terrorism and the Internet 312
Graphic Evidence 312
Conclusions 318
Evaluation 318
Suggested Readings 319
Notes 320
Index 321
|
adam_txt |
Contents
Preface xi
Introduction 1
Part I Terrorism in Perspective
1 An Idea Whose Time Has Come? 4
Modem Definitions of an Old Concept 8
Crucial Components of Terrorism 10
Typologies of Terrorism: Useful Tools 16
Using Tactics as Labels 18
Conclusions 19
Evaluation 19
Suggested Readings 20
Notes 20
2 Not a Modern Phenomenon 22
Tyrannicide: "To Go Too Fast" 24
State Terrorism 26
Guerrilla Warfare: Selective Violence 26
Cyclical Nature of Terror 28
Conclusions 31
Evaluation 34
Suggested Readings 35
Notes 35
V
vi Contents
3 Ideology and Terrorism: Rights from Wrongs? 36
The Rationalization of Violence 37
Rebellion and the Right of Self Determination 40
Terrorist Beliefs and Images 44
Causes of the Left and Right 46
Conclusions 50
Evaluation 50
Suggested Readings 51
Notes 51
Part II Who Are the Terrorists?
4 Criminals or Crusaders? 53
Profile of a Terrorist 5 3
Can We Generalize About a "Typical" Terrorist? 57
Terrorism Is Different Today 63
Trends in Terrorist Recruitment and Membership 65
Conclusions 72
Evaluation 73
Suggested Readings 74
Notes 74
5 Terrorism by the State 75
Internal Terrorism: The Beast That Lurks Within 76
The Continuing Reality of State Terror 81
International Efforts to Restrict Internal State Terrorism 82
Terrorism as an Instrument of Foreign Policy: Waging War by Proxy 85
Reluctant Bedfellows: The Arms Bazaar 88
Weapons of Mass Destruction on the Arms Bazaar 89
Silent Partners: Waging Subtle War 90
Terrorist Supported States 95
Conclusions 97
Evaluation 97
Suggested Readings 98
Notes 98
O Terrorism, Inc. 100
Networking 100
Shared Strategic Planning 101
Terrorism Is Big Business 103
Contents vii
The Internationalization of Terrorism 112
The Network and Netwar 114
Narcoterrorism 116
Conclusions 118
Evaluation 120
Suggested Readings 121
Notes 122
Part III How Do They Operate?
7 Terrorist Training 123
The "How" Questions 123
Training Sites 124
Training Topics: What Do They Learn at Camp? 126
Potential for Destruction: A Terrorist's Arsenal 135
Terrorist Tactics 142
Phases of a Terrorist Incident 149
Evaluation 151
Suggested Readings 152
Notes 152
8 The Media: A Weapon for Both Sides? 153
Propaganda by the Deed 153
Legal Issue of the Right of Access 155
Censorship: The Ugly Word 157
Complicity: A Very Serious Charge 161
Terrorist Goals Regarding Media 165
Government Goals Regarding Media 167
Media Goals in Terrorist Events 168
Conclusions 170
Evaluation 171
Suggested Readings 172
Notes 173
9 Domestic Terrorism in the United States 174
Historical Roots in the United States 174
Conceptualizing Domestic Terrorism in the United States 177
Cyberterrorism 193
Conclusions 194
Evaluation 196
Suggested Readings 197
Notes 198
viii Contents
Part IV Responses to Terrorism
10 Legal Perspectives on Terrorism 199
Terrorism Is a Crime 199
Laws of War 202
Piracy of Air and Sea 207
Protection of Diplomatic Personnel and Heads of State 211
Regional Legal Efforts to Prevent or Punish Terrorism 212
Summary: International Protection of the Innocent against
Specific Crimes 214
Is Terrorism a Political Crime? 215
United Nations and the War on Terrorism 217
Conclusions 219
Evaluation 220
Suggested Readings 221
Notes 222
11 Counterterrorism: The Use of Special Forces 224
Nations without Defenses 225
Strike Forces: A First Line of Defense? 225
Too Many U.S. Options? 232
Conclusions 240
Evaluation 241
Suggested Readings 241
Notes 242
12 Terrorism, Intelligence, and the Law 243
Legal Initiatives to Counter Terrorism 243
Investigation: The Intelligence Initiative 252
Governments Use Investigation and Intelligence 256
Intelligence Gathering and Counterintelligence by Terrorists 259
Conclusions 260
Evaluation 260
Suggested Readings 262
Notes 262
13 Security Measures: A Frail Defense 264
Three Facets of Security 265
Airport Security in the United States 268
Impact of September 11 Attacks on Airport Security 271
The Costs of Security 273
Protecting Public Transportation 275
Contents ix
Preventive Security 277
Threat Assessment: How Do You Know When You Are at Risk? 278
Conclusions 279
Evaluation 280
Suggested Readings 281
Notes 281
Part V Current Trends and Future Prospects
14 The New Terrorist Threat: Weapons of Mass
Destruction 283
Context of the Threat 283
Historical Use of Weapons of Mass Destruction 284
Types of Weapons of Mass Destruction Available Today 287
Access to and Use of Weapons of Mass Destruction 296
Conclusions 300
Evaluation 301
Suggested Readings 302
Notes 303
15 Future Trends 304
A "War" on Terrorism 304
Positive Outcomes of the September 11 Attacks 306
Dealing with Weapons of Mass Destruction 308
Trends in Terrorism 310
Impact of the Generational Difference 311
Terrorism and the Internet 312
Graphic Evidence 312
Conclusions 318
Evaluation 318
Suggested Readings 319
Notes 320
Index 321 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Combs, Cindy C. |
author_facet | Combs, Cindy C. |
author_role | aut |
author_sort | Combs, Cindy C. |
author_variant | c c c cc ccc |
building | Verbundindex |
bvnumber | BV021788710 |
callnumber-first | H - Social Science |
callnumber-label | HV6431 |
callnumber-raw | HV6431 HV6431.C472 2006 |
callnumber-search | HV6431 HV6431.C472 2006 |
callnumber-sort | HV 46431 |
callnumber-subject | HV - Social Pathology, Criminology |
classification_rvk | MD 8920 |
ctrlnum | (OCoLC)60835336 (DE-599)BVBBV021788710 |
dewey-full | 303.6/25 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 303 - Social processes |
dewey-raw | 303.6/25 |
dewey-search | 303.6/25 |
dewey-sort | 3303.6 225 |
dewey-tens | 300 - Social sciences |
discipline | Soziologie Politologie |
discipline_str_mv | Soziologie Politologie |
edition | 4. ed. |
era | Geschichte gnd Prognose gnd |
era_facet | Geschichte Prognose |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02317nam a2200625zc 4500</leader><controlfield tag="001">BV021788710</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20180416 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">061030s2006 xxua||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2005018659</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">013193063X</subfield><subfield code="9">0-13-193063-X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)60835336</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV021788710</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HV6431</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HV6431.C472 2006</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">303.6/25</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MD 8920</subfield><subfield code="0">(DE-625)122569:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Combs, Cindy C.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Terrorism in the twenty-first century</subfield><subfield code="c">Cindy C. Combs</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Terrorism in the 21st century</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">4. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Upper Saddle River, N.J.</subfield><subfield code="b">Pearson/Prentice Hall</subfield><subfield code="c">2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xii, 334 S.</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="648" ind1=" " ind2="7"><subfield code="a">Geschichte</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="648" ind1=" " ind2="7"><subfield code="a">Prognose</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorismus</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorism</subfield><subfield code="x">Forecasting</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Prognose</subfield><subfield code="0">(DE-588)4047390-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="8">1\p</subfield><subfield code="0">(DE-588)4066724-8</subfield><subfield code="a">Wörterbuch</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Prognose</subfield><subfield code="A">z</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Prognose</subfield><subfield code="0">(DE-588)4047390-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Geschichte</subfield><subfield code="A">z</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">3\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/toc/ecip0515/2005018659.html</subfield><subfield code="3">Table of contents</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015001393&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-015001393</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">3\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
genre | 1\p (DE-588)4066724-8 Wörterbuch gnd-content |
genre_facet | Wörterbuch |
id | DE-604.BV021788710 |
illustrated | Illustrated |
index_date | 2024-07-02T15:43:47Z |
indexdate | 2024-07-09T20:44:38Z |
institution | BVB |
isbn | 013193063X |
language | English |
lccn | 2005018659 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-015001393 |
oclc_num | 60835336 |
open_access_boolean | |
owner | DE-12 |
owner_facet | DE-12 |
physical | xii, 334 S. Ill. |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Pearson/Prentice Hall |
record_format | marc |
spelling | Combs, Cindy C. Verfasser aut Terrorism in the twenty-first century Cindy C. Combs Terrorism in the 21st century 4. ed. Upper Saddle River, N.J. Pearson/Prentice Hall 2006 xii, 334 S. Ill. txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index Geschichte gnd rswk-swf Prognose gnd rswk-swf Terrorismus Terrorism Terrorism Forecasting Prognose (DE-588)4047390-9 gnd rswk-swf Terrorismus (DE-588)4059534-1 gnd rswk-swf 1\p (DE-588)4066724-8 Wörterbuch gnd-content Terrorismus (DE-588)4059534-1 s Prognose z DE-604 Prognose (DE-588)4047390-9 s 2\p DE-604 Geschichte z 3\p DE-604 http://www.loc.gov/catdir/toc/ecip0515/2005018659.html Table of contents HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015001393&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 3\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Combs, Cindy C. Terrorism in the twenty-first century Terrorismus Terrorism Terrorism Forecasting Prognose (DE-588)4047390-9 gnd Terrorismus (DE-588)4059534-1 gnd |
subject_GND | (DE-588)4047390-9 (DE-588)4059534-1 (DE-588)4066724-8 |
title | Terrorism in the twenty-first century |
title_alt | Terrorism in the 21st century |
title_auth | Terrorism in the twenty-first century |
title_exact_search | Terrorism in the twenty-first century |
title_exact_search_txtP | Terrorism in the twenty-first century |
title_full | Terrorism in the twenty-first century Cindy C. Combs |
title_fullStr | Terrorism in the twenty-first century Cindy C. Combs |
title_full_unstemmed | Terrorism in the twenty-first century Cindy C. Combs |
title_short | Terrorism in the twenty-first century |
title_sort | terrorism in the twenty first century |
topic | Terrorismus Terrorism Terrorism Forecasting Prognose (DE-588)4047390-9 gnd Terrorismus (DE-588)4059534-1 gnd |
topic_facet | Terrorismus Terrorism Terrorism Forecasting Prognose Wörterbuch |
url | http://www.loc.gov/catdir/toc/ecip0515/2005018659.html http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015001393&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT combscindyc terrorisminthetwentyfirstcentury AT combscindyc terrorisminthe21stcentury |