Breaching the fortress wall: understanding terrorist efforts to overcome defensive technologies
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Santa Monica, CA
RAND Homeland Security
2007
|
Schriftenreihe: | Rand Corporation monograph series
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | "Prepared for the Department of Homeland Security.". - "MG-481-DHS"--P. [4] of cover Includes bibliographical references (p. 139-153) Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One -- Introduction; Chapter Two -- Palestinian Terrorist Groups; Chapter Three -- Jemaah Islamiyah and Affiliated Groups; Chapter Four -- Liberation Tigers of Tamil Eelam; Chapter Five -- Provisional Irish Republican Army; Chapter Six -- Conclusions: Understanding Terrorists' Countertechnology Efforts; Appendix; Bibliography The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to target groups? efforts and protect the public from the threat of terrorist violence. Terrorist organizations are acutely aware of government efforts to deploy these systems and actively seek ways to evade or counteract them. This study draws on relevant data from the history of a variety of terroris |
Beschreibung: | 1 Online-Ressource (xxviii, 153 p.) |
ISBN: | 0833039148 0833042475 9780833039149 9780833042477 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043086160 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2007 |||| o||u| ||||||eng d | ||
020 | |a 0833039148 |9 0-8330-3914-8 | ||
020 | |a 0833042475 |c electronic bk. |9 0-8330-4247-5 | ||
020 | |a 9780833039149 |9 978-0-8330-3914-9 | ||
020 | |a 9780833042477 |c electronic bk. |9 978-0-8330-4247-7 | ||
035 | |a (OCoLC)183658196 | ||
035 | |a (DE-599)BVBBV043086160 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 363.325/72 |2 22 | |
245 | 1 | 0 | |a Breaching the fortress wall |b understanding terrorist efforts to overcome defensive technologies |c Brian A. Jackson ... [et al.] |
264 | 1 | |a Santa Monica, CA |b RAND Homeland Security |c 2007 | |
300 | |a 1 Online-Ressource (xxviii, 153 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Rand Corporation monograph series | |
500 | |a "Prepared for the Department of Homeland Security.". - "MG-481-DHS"--P. [4] of cover | ||
500 | |a Includes bibliographical references (p. 139-153) | ||
500 | |a Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One -- Introduction; Chapter Two -- Palestinian Terrorist Groups; Chapter Three -- Jemaah Islamiyah and Affiliated Groups; Chapter Four -- Liberation Tigers of Tamil Eelam; Chapter Five -- Provisional Irish Republican Army; Chapter Six -- Conclusions: Understanding Terrorists' Countertechnology Efforts; Appendix; Bibliography | ||
500 | |a The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to target groups? efforts and protect the public from the threat of terrorist violence. Terrorist organizations are acutely aware of government efforts to deploy these systems and actively seek ways to evade or counteract them. This study draws on relevant data from the history of a variety of terroris | ||
610 | 1 | 7 | |a War on Terrorism (2001-2009) |2 fast |
648 | 7 | |a 2001 - 2009 |2 fast | |
650 | 7 | |a POLITICAL SCIENCE / Political Freedom & Security / Terrorism |2 bisacsh | |
650 | 7 | |a Terrorismus |2 swd | |
650 | 7 | |a Bekämpfung |2 swd | |
650 | 7 | |a Sicherheitsmaßnahme |2 swd | |
650 | 7 | |a POLITICAL SCIENCE / Terrorism |2 bisacsh | |
650 | 7 | |a National security |2 fast | |
650 | 7 | |a Security systems |2 fast | |
650 | 7 | |a Technology |2 fast | |
650 | 7 | |a Terrorism |2 fast | |
650 | 7 | |a Terrorism / Prevention |2 fast | |
650 | 4 | |a Terrorismus | |
650 | 4 | |a War on Terrorism, 2001-2009 |x Technology | |
650 | 4 | |a Security systems | |
650 | 4 | |a Terrorism |x Prevention | |
650 | 4 | |a Terrorism |x Prevention |v Case studies | |
650 | 4 | |a Terrorism |v Case studies | |
650 | 4 | |a National security | |
650 | 0 | 7 | |a Sicherheitsmaßnahme |0 (DE-588)4181167-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Terrorismus |0 (DE-588)4059534-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Bekämpfung |0 (DE-588)4112701-8 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4522595-3 |a Fallstudiensammlung |2 gnd-content | |
689 | 0 | 0 | |a Terrorismus |0 (DE-588)4059534-1 |D s |
689 | 0 | 1 | |a Bekämpfung |0 (DE-588)4112701-8 |D s |
689 | 0 | 2 | |a Sicherheitsmaßnahme |0 (DE-588)4181167-7 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Jackson, Brian A. |e Sonstige |4 oth | |
710 | 2 | |a United States |b Department of Homeland Security |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=213900 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028510352 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=213900 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=213900 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175482628866048 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV043086160 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)183658196 (DE-599)BVBBV043086160 |
dewey-full | 363.325/72 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.325/72 |
dewey-search | 363.325/72 |
dewey-sort | 3363.325 272 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
era | 2001 - 2009 fast |
era_facet | 2001 - 2009 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04192nmm a2200757zc 4500</leader><controlfield tag="001">BV043086160</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2007 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0833039148</subfield><subfield code="9">0-8330-3914-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0833042475</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-8330-4247-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780833039149</subfield><subfield code="9">978-0-8330-3914-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780833042477</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-8330-4247-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)183658196</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043086160</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.325/72</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Breaching the fortress wall</subfield><subfield code="b">understanding terrorist efforts to overcome defensive technologies</subfield><subfield code="c">Brian A. Jackson ... [et al.]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Santa Monica, CA</subfield><subfield code="b">RAND Homeland Security</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxviii, 153 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Rand Corporation monograph series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Prepared for the Department of Homeland Security.". - "MG-481-DHS"--P. [4] of cover</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (p. 139-153)</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One -- Introduction; Chapter Two -- Palestinian Terrorist Groups; Chapter Three -- Jemaah Islamiyah and Affiliated Groups; Chapter Four -- Liberation Tigers of Tamil Eelam; Chapter Five -- Provisional Irish Republican Army; Chapter Six -- Conclusions: Understanding Terrorists' Countertechnology Efforts; Appendix; Bibliography</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to target groups? efforts and protect the public from the threat of terrorist violence. Terrorist organizations are acutely aware of government efforts to deploy these systems and actively seek ways to evade or counteract them. This study draws on relevant data from the history of a variety of terroris</subfield></datafield><datafield tag="610" ind1="1" ind2="7"><subfield code="a">War on Terrorism (2001-2009)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="648" ind1=" " ind2="7"><subfield code="a">2001 - 2009</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / Political Freedom & Security / Terrorism</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Terrorismus</subfield><subfield code="2">swd</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Bekämpfung</subfield><subfield code="2">swd</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Sicherheitsmaßnahme</subfield><subfield code="2">swd</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / Terrorism</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">National security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Security systems</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Technology</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Terrorism</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Terrorism / Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorismus</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">War on Terrorism, 2001-2009</subfield><subfield code="x">Technology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorism</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorism</subfield><subfield code="x">Prevention</subfield><subfield code="v">Case studies</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorism</subfield><subfield code="v">Case studies</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">National security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsmaßnahme</subfield><subfield code="0">(DE-588)4181167-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Bekämpfung</subfield><subfield code="0">(DE-588)4112701-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4522595-3</subfield><subfield code="a">Fallstudiensammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Bekämpfung</subfield><subfield code="0">(DE-588)4112701-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Sicherheitsmaßnahme</subfield><subfield code="0">(DE-588)4181167-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jackson, Brian A.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">United States</subfield><subfield code="b">Department of Homeland Security</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=213900</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028510352</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=213900</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=213900</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4522595-3 Fallstudiensammlung gnd-content |
genre_facet | Fallstudiensammlung |
id | DE-604.BV043086160 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:17:00Z |
institution | BVB |
isbn | 0833039148 0833042475 9780833039149 9780833042477 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028510352 |
oclc_num | 183658196 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xxviii, 153 p.) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | RAND Homeland Security |
record_format | marc |
series2 | Rand Corporation monograph series |
spelling | Breaching the fortress wall understanding terrorist efforts to overcome defensive technologies Brian A. Jackson ... [et al.] Santa Monica, CA RAND Homeland Security 2007 1 Online-Ressource (xxviii, 153 p.) txt rdacontent c rdamedia cr rdacarrier Rand Corporation monograph series "Prepared for the Department of Homeland Security.". - "MG-481-DHS"--P. [4] of cover Includes bibliographical references (p. 139-153) Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One -- Introduction; Chapter Two -- Palestinian Terrorist Groups; Chapter Three -- Jemaah Islamiyah and Affiliated Groups; Chapter Four -- Liberation Tigers of Tamil Eelam; Chapter Five -- Provisional Irish Republican Army; Chapter Six -- Conclusions: Understanding Terrorists' Countertechnology Efforts; Appendix; Bibliography The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to target groups? efforts and protect the public from the threat of terrorist violence. Terrorist organizations are acutely aware of government efforts to deploy these systems and actively seek ways to evade or counteract them. This study draws on relevant data from the history of a variety of terroris War on Terrorism (2001-2009) fast 2001 - 2009 fast POLITICAL SCIENCE / Political Freedom & Security / Terrorism bisacsh Terrorismus swd Bekämpfung swd Sicherheitsmaßnahme swd POLITICAL SCIENCE / Terrorism bisacsh National security fast Security systems fast Technology fast Terrorism fast Terrorism / Prevention fast Terrorismus War on Terrorism, 2001-2009 Technology Security systems Terrorism Prevention Terrorism Prevention Case studies Terrorism Case studies National security Sicherheitsmaßnahme (DE-588)4181167-7 gnd rswk-swf Terrorismus (DE-588)4059534-1 gnd rswk-swf Bekämpfung (DE-588)4112701-8 gnd rswk-swf (DE-588)4522595-3 Fallstudiensammlung gnd-content Terrorismus (DE-588)4059534-1 s Bekämpfung (DE-588)4112701-8 s Sicherheitsmaßnahme (DE-588)4181167-7 s 1\p DE-604 Jackson, Brian A. Sonstige oth United States Department of Homeland Security Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=213900 Aggregator Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Breaching the fortress wall understanding terrorist efforts to overcome defensive technologies War on Terrorism (2001-2009) fast POLITICAL SCIENCE / Political Freedom & Security / Terrorism bisacsh Terrorismus swd Bekämpfung swd Sicherheitsmaßnahme swd POLITICAL SCIENCE / Terrorism bisacsh National security fast Security systems fast Technology fast Terrorism fast Terrorism / Prevention fast Terrorismus War on Terrorism, 2001-2009 Technology Security systems Terrorism Prevention Terrorism Prevention Case studies Terrorism Case studies National security Sicherheitsmaßnahme (DE-588)4181167-7 gnd Terrorismus (DE-588)4059534-1 gnd Bekämpfung (DE-588)4112701-8 gnd |
subject_GND | (DE-588)4181167-7 (DE-588)4059534-1 (DE-588)4112701-8 (DE-588)4522595-3 |
title | Breaching the fortress wall understanding terrorist efforts to overcome defensive technologies |
title_auth | Breaching the fortress wall understanding terrorist efforts to overcome defensive technologies |
title_exact_search | Breaching the fortress wall understanding terrorist efforts to overcome defensive technologies |
title_full | Breaching the fortress wall understanding terrorist efforts to overcome defensive technologies Brian A. Jackson ... [et al.] |
title_fullStr | Breaching the fortress wall understanding terrorist efforts to overcome defensive technologies Brian A. Jackson ... [et al.] |
title_full_unstemmed | Breaching the fortress wall understanding terrorist efforts to overcome defensive technologies Brian A. Jackson ... [et al.] |
title_short | Breaching the fortress wall |
title_sort | breaching the fortress wall understanding terrorist efforts to overcome defensive technologies |
title_sub | understanding terrorist efforts to overcome defensive technologies |
topic | War on Terrorism (2001-2009) fast POLITICAL SCIENCE / Political Freedom & Security / Terrorism bisacsh Terrorismus swd Bekämpfung swd Sicherheitsmaßnahme swd POLITICAL SCIENCE / Terrorism bisacsh National security fast Security systems fast Technology fast Terrorism fast Terrorism / Prevention fast Terrorismus War on Terrorism, 2001-2009 Technology Security systems Terrorism Prevention Terrorism Prevention Case studies Terrorism Case studies National security Sicherheitsmaßnahme (DE-588)4181167-7 gnd Terrorismus (DE-588)4059534-1 gnd Bekämpfung (DE-588)4112701-8 gnd |
topic_facet | War on Terrorism (2001-2009) POLITICAL SCIENCE / Political Freedom & Security / Terrorism Terrorismus Bekämpfung Sicherheitsmaßnahme POLITICAL SCIENCE / Terrorism National security Security systems Technology Terrorism Terrorism / Prevention War on Terrorism, 2001-2009 Technology Terrorism Prevention Terrorism Prevention Case studies Terrorism Case studies Fallstudiensammlung |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=213900 |
work_keys_str_mv | AT jacksonbriana breachingthefortresswallunderstandingterroristeffortstoovercomedefensivetechnologies AT unitedstatesdepartmentofhomelandsecurity breachingthefortresswallunderstandingterroristeffortstoovercomedefensivetechnologies |