Breaching the fortress wall :: understanding terrorist efforts to overcome defensive technologies /
The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to...
Gespeichert in:
Körperschaft: | |
---|---|
Weitere Verfasser: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Santa Monica, CA :
RAND Homeland Security,
2007.
|
Schriftenreihe: | Rand Corporation monograph series.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to target groups? efforts and protect the public from the threat of terrorist violence. Terrorist organizations are acutely aware of government efforts to deploy these systems and actively seek ways to evade or counteract them. This study draws on relevant data from the history of a variety of terroris. |
Beschreibung: | "Prepared for the Department of Homeland Security." "MG-481-DHS"--Page 4 of cover |
Beschreibung: | 1 online resource (xxviii, 153 pages) : illustrations, maps |
Bibliographie: | Includes bibliographical references (pages 139-153). |
ISBN: | 9780833042477 0833042475 9781281180902 1281180904 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn183658196 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 071213s2007 cauab ob 000 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d YDXCP |d OCLCA |d OCLCQ |d IDEBK |d OCLCQ |d TUU |d OCLCQ |d MERUC |d COO |d OCLCO |d ADU |d E7B |d DOS |d CLU |d COCUF |d UBY |d WAU |d OCLCE |d OCLCQ |d OCLCA |d JSTOR |d OCLCF |d ZBL |d OCLCQ |d NLGGC |d OCLCO |d OCLCQ |d OCLCO |d UAT |d OCLCO |d OCL |d OCLCQ |d AZK |d LOA |d OCLCO |d JBG |d AGLDB |d TOA |d OCLCO |d CNNOR |d CUS |d MOR |d PIFAG |d PIFBR |d OCLCQ |d VT2 |d OCLCO |d WY@ |d OCLCO |d VFL |d LND |d LUE |d ICG |d RCC |d BRL |d STF |d VNS |d WRM |d U3W |d VTS |d NRAMU |d OCLCQ |d OCLCO |d EZ9 |d OCLCQ |d OCLCO |d ERL |d WYU |d A6Q |d OCLCQ |d OCLCO |d OCLCA |d CNTRU |d NJT |d OCL |d UKCRE |d BOL |d OCLCQ |d OCLCO |d OCLCQ |d MHW |d OCLCO |d OCLCQ |d ANO |d OCLCQ |d UEJ |d OCLCO |d OCLCL |d OCLCQ | ||
019 | |a 83599790 |a 290607217 |a 614508337 |a 646742373 |a 655088467 |a 712978054 |a 722661686 |a 855305771 |a 961621732 |a 962689177 |a 966202827 |a 988418308 |a 991993812 |a 992086757 |a 1008947086 |a 1037464230 |a 1037501028 |a 1037782603 |a 1038696388 |a 1044482042 |a 1045497412 |a 1055343716 |a 1063981217 |a 1076289659 |a 1114394708 |a 1153454620 |a 1401733999 |a 1440421862 | ||
020 | |a 9780833042477 |q (electronic bk.) | ||
020 | |a 0833042475 |q (electronic bk.) | ||
020 | |z 9780833039149 | ||
020 | |z 0833039148 | ||
020 | 0 | |a 9781281180902 |q (online) | |
020 | |a 1281180904 | ||
027 | |a RAND/MG-481-DHS | ||
035 | |a (OCoLC)183658196 |z (OCoLC)83599790 |z (OCoLC)290607217 |z (OCoLC)614508337 |z (OCoLC)646742373 |z (OCoLC)655088467 |z (OCoLC)712978054 |z (OCoLC)722661686 |z (OCoLC)855305771 |z (OCoLC)961621732 |z (OCoLC)962689177 |z (OCoLC)966202827 |z (OCoLC)988418308 |z (OCoLC)991993812 |z (OCoLC)992086757 |z (OCoLC)1008947086 |z (OCoLC)1037464230 |z (OCoLC)1037501028 |z (OCoLC)1037782603 |z (OCoLC)1038696388 |z (OCoLC)1044482042 |z (OCoLC)1045497412 |z (OCoLC)1055343716 |z (OCoLC)1063981217 |z (OCoLC)1076289659 |z (OCoLC)1114394708 |z (OCoLC)1153454620 |z (OCoLC)1401733999 |z (OCoLC)1440421862 | ||
037 | |a 22573/cttd5r2 |b JSTOR | ||
050 | 4 | |a HV6431 |b .B737 2007eb | |
072 | 7 | |a POL |x 037000 |2 bisacsh | |
072 | 7 | |a POL037000 |2 bisacsh | |
072 | 7 | |a POL012000 |2 bisacsh | |
082 | 7 | |a 363.325/72 |2 22 | |
049 | |a MAIN | ||
245 | 0 | 0 | |a Breaching the fortress wall : |b understanding terrorist efforts to overcome defensive technologies / |c Brian A. Jackson [and others]. |
260 | |a Santa Monica, CA : |b RAND Homeland Security, |c 2007. | ||
300 | |a 1 online resource (xxviii, 153 pages) : |b illustrations, maps | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
340 | |g polychrome. |2 rdacc |0 http://rdaregistry.info/termList/RDAColourContent/1003 | ||
347 | |a data file | ||
490 | 1 | |a Rand Corporation monograph series | |
500 | |a "Prepared for the Department of Homeland Security." | ||
500 | |a "MG-481-DHS"--Page 4 of cover | ||
504 | |a Includes bibliographical references (pages 139-153). | ||
588 | 0 | |a Print version record. | |
505 | 0 | |a Ch. 1: Introduction -- ch. 2: Palestinian terrorist groups -- ch. 3: Jemaah Islamiyah and affiliated groups -- ch. 4: Liberation Tigers of Tamil Eelam -- ch. 5: Provisional Irish Republican Army -- ch. 6: Conclusions: understanding terrorists' countertechnology efforts -- Appendix -- Bibliography. | |
520 | |a The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to target groups? efforts and protect the public from the threat of terrorist violence. Terrorist organizations are acutely aware of government efforts to deploy these systems and actively seek ways to evade or counteract them. This study draws on relevant data from the history of a variety of terroris. | ||
650 | 0 | |a War on Terrorism, 2001-2009 |x Technology. | |
650 | 0 | |a Security systems. |0 http://id.loc.gov/authorities/subjects/sh85119483 | |
650 | 0 | |a Terrorism |x Prevention. |0 http://id.loc.gov/authorities/subjects/sh00007517 | |
650 | 0 | |a Terrorism |x Prevention |v Case studies. | |
650 | 0 | |a Terrorism |v Case studies. | |
650 | 0 | |a National security. |0 http://id.loc.gov/authorities/subjects/sh85090122 | |
650 | 6 | |a Guerre contre le terrorisme, 2001-2009 |x Technologie. | |
650 | 6 | |a Systèmes de sécurité. | |
650 | 6 | |a Terrorisme |x Prévention. | |
650 | 6 | |a Terrorisme |x Prévention |v Études de cas. | |
650 | 6 | |a Terrorisme |v Études de cas. | |
650 | 7 | |a security systems. |2 aat | |
650 | 7 | |a POLITICAL SCIENCE |x Political Freedom & Security |x Terrorism. |2 bisacsh | |
650 | 7 | |a POLITICAL SCIENCE |x Terrorism. |2 bisacsh | |
650 | 7 | |a National security |2 fast | |
650 | 7 | |a Security systems |2 fast | |
650 | 7 | |a Technology |2 fast | |
650 | 7 | |a Terrorism |2 fast | |
650 | 7 | |a Terrorism |x Prevention |2 fast | |
650 | 7 | |a Terrorismus |2 gnd |0 http://d-nb.info/gnd/4059534-1 | |
650 | 7 | |a Bekämpfung |2 gnd |0 http://d-nb.info/gnd/4112701-8 | |
650 | 7 | |a Sicherheitsmaßnahme |2 gnd | |
647 | 7 | |a War on Terrorism |d (2001-2009) |2 fast |1 https://id.oclc.org/worldcat/entity/E39Qhp4vB9HVBC9J8MqvQ8QwjK | |
648 | 7 | |a 2001-2009 |2 fast | |
655 | 7 | |a Case studies |2 fast | |
655 | 7 | |a Case studies. |2 lcgft |0 http://id.loc.gov/authorities/genreForms/gf2017026140 | |
655 | 7 | |a Études de cas. |2 rvmgf | |
700 | 1 | |a Jackson, Brian A., |d 1972- |1 https://id.oclc.org/worldcat/entity/E39PCjM7h9PmCvkHF37bYxMfpX |0 http://id.loc.gov/authorities/names/n2008021357 | |
710 | 1 | |a United States. |b Department of Homeland Security. |0 http://id.loc.gov/authorities/names/no2002051730 | |
773 | 0 | |t Books at JSTOR: Open Access |d JSTOR | |
776 | 0 | 8 | |i Print version: |t Breaching the fortress wall. |d Santa Monica, CA : RAND Homeland Security, 2007 |z 0833039148 |z 9780833039149 |w (DLC) 2006001721 |w (OCoLC)63125906 |
830 | 0 | |a Rand Corporation monograph series. |0 http://id.loc.gov/authorities/names/no2008057654 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=213900 |3 Volltext |
938 | |a ebrary |b EBRY |n ebr10225503 | ||
938 | |a EBSCOhost |b EBSC |n 213900 | ||
938 | |a YBP Library Services |b YANK |n 2745219 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn183658196 |
---|---|
_version_ | 1816881658755809280 |
adam_text | |
any_adam_object | |
author2 | Jackson, Brian A., 1972- |
author2_role | |
author2_variant | b a j ba baj |
author_GND | http://id.loc.gov/authorities/names/n2008021357 |
author_corporate | United States. Department of Homeland Security |
author_corporate_role | |
author_facet | Jackson, Brian A., 1972- United States. Department of Homeland Security |
author_sort | Jackson, Brian A., 1972- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HV6431 |
callnumber-raw | HV6431 .B737 2007eb |
callnumber-search | HV6431 .B737 2007eb |
callnumber-sort | HV 46431 B737 42007EB |
callnumber-subject | HV - Social Pathology, Criminology |
collection | ZDB-4-EBA |
contents | Ch. 1: Introduction -- ch. 2: Palestinian terrorist groups -- ch. 3: Jemaah Islamiyah and affiliated groups -- ch. 4: Liberation Tigers of Tamil Eelam -- ch. 5: Provisional Irish Republican Army -- ch. 6: Conclusions: understanding terrorists' countertechnology efforts -- Appendix -- Bibliography. |
ctrlnum | (OCoLC)183658196 |
dewey-full | 363.325/72 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.325/72 |
dewey-search | 363.325/72 |
dewey-sort | 3363.325 272 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
era | 2001-2009 fast |
era_facet | 2001-2009 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06270cam a2200925 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn183658196</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">071213s2007 cauab ob 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCA</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IDEBK</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">TUU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">MERUC</subfield><subfield code="d">COO</subfield><subfield code="d">OCLCO</subfield><subfield code="d">ADU</subfield><subfield code="d">E7B</subfield><subfield code="d">DOS</subfield><subfield code="d">CLU</subfield><subfield code="d">COCUF</subfield><subfield code="d">UBY</subfield><subfield code="d">WAU</subfield><subfield code="d">OCLCE</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCA</subfield><subfield code="d">JSTOR</subfield><subfield code="d">OCLCF</subfield><subfield code="d">ZBL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">NLGGC</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">UAT</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AZK</subfield><subfield code="d">LOA</subfield><subfield code="d">OCLCO</subfield><subfield code="d">JBG</subfield><subfield code="d">AGLDB</subfield><subfield code="d">TOA</subfield><subfield code="d">OCLCO</subfield><subfield code="d">CNNOR</subfield><subfield code="d">CUS</subfield><subfield code="d">MOR</subfield><subfield code="d">PIFAG</subfield><subfield code="d">PIFBR</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCO</subfield><subfield code="d">WY@</subfield><subfield code="d">OCLCO</subfield><subfield code="d">VFL</subfield><subfield code="d">LND</subfield><subfield code="d">LUE</subfield><subfield code="d">ICG</subfield><subfield code="d">RCC</subfield><subfield code="d">BRL</subfield><subfield code="d">STF</subfield><subfield code="d">VNS</subfield><subfield code="d">WRM</subfield><subfield code="d">U3W</subfield><subfield code="d">VTS</subfield><subfield code="d">NRAMU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">EZ9</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">ERL</subfield><subfield code="d">WYU</subfield><subfield code="d">A6Q</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCA</subfield><subfield code="d">CNTRU</subfield><subfield code="d">NJT</subfield><subfield code="d">OCL</subfield><subfield code="d">UKCRE</subfield><subfield code="d">BOL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">MHW</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">ANO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UEJ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">83599790</subfield><subfield code="a">290607217</subfield><subfield code="a">614508337</subfield><subfield code="a">646742373</subfield><subfield code="a">655088467</subfield><subfield code="a">712978054</subfield><subfield code="a">722661686</subfield><subfield code="a">855305771</subfield><subfield code="a">961621732</subfield><subfield code="a">962689177</subfield><subfield code="a">966202827</subfield><subfield code="a">988418308</subfield><subfield code="a">991993812</subfield><subfield code="a">992086757</subfield><subfield code="a">1008947086</subfield><subfield code="a">1037464230</subfield><subfield code="a">1037501028</subfield><subfield code="a">1037782603</subfield><subfield code="a">1038696388</subfield><subfield code="a">1044482042</subfield><subfield code="a">1045497412</subfield><subfield code="a">1055343716</subfield><subfield code="a">1063981217</subfield><subfield code="a">1076289659</subfield><subfield code="a">1114394708</subfield><subfield code="a">1153454620</subfield><subfield code="a">1401733999</subfield><subfield code="a">1440421862</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780833042477</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0833042475</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9780833039149</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">0833039148</subfield></datafield><datafield tag="020" ind1="0" ind2=" "><subfield code="a">9781281180902</subfield><subfield code="q">(online)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281180904</subfield></datafield><datafield tag="027" ind1=" " ind2=" "><subfield code="a">RAND/MG-481-DHS</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)183658196</subfield><subfield code="z">(OCoLC)83599790</subfield><subfield code="z">(OCoLC)290607217</subfield><subfield code="z">(OCoLC)614508337</subfield><subfield code="z">(OCoLC)646742373</subfield><subfield code="z">(OCoLC)655088467</subfield><subfield code="z">(OCoLC)712978054</subfield><subfield code="z">(OCoLC)722661686</subfield><subfield code="z">(OCoLC)855305771</subfield><subfield code="z">(OCoLC)961621732</subfield><subfield code="z">(OCoLC)962689177</subfield><subfield code="z">(OCoLC)966202827</subfield><subfield code="z">(OCoLC)988418308</subfield><subfield code="z">(OCoLC)991993812</subfield><subfield code="z">(OCoLC)992086757</subfield><subfield code="z">(OCoLC)1008947086</subfield><subfield code="z">(OCoLC)1037464230</subfield><subfield code="z">(OCoLC)1037501028</subfield><subfield code="z">(OCoLC)1037782603</subfield><subfield code="z">(OCoLC)1038696388</subfield><subfield code="z">(OCoLC)1044482042</subfield><subfield code="z">(OCoLC)1045497412</subfield><subfield code="z">(OCoLC)1055343716</subfield><subfield code="z">(OCoLC)1063981217</subfield><subfield code="z">(OCoLC)1076289659</subfield><subfield code="z">(OCoLC)1114394708</subfield><subfield code="z">(OCoLC)1153454620</subfield><subfield code="z">(OCoLC)1401733999</subfield><subfield code="z">(OCoLC)1440421862</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">22573/cttd5r2</subfield><subfield code="b">JSTOR</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HV6431</subfield><subfield code="b">.B737 2007eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL</subfield><subfield code="x">037000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL037000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL012000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">363.325/72</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Breaching the fortress wall :</subfield><subfield code="b">understanding terrorist efforts to overcome defensive technologies /</subfield><subfield code="c">Brian A. Jackson [and others].</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Santa Monica, CA :</subfield><subfield code="b">RAND Homeland Security,</subfield><subfield code="c">2007.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxviii, 153 pages) :</subfield><subfield code="b">illustrations, maps</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="340" ind1=" " ind2=" "><subfield code="g">polychrome.</subfield><subfield code="2">rdacc</subfield><subfield code="0">http://rdaregistry.info/termList/RDAColourContent/1003</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Rand Corporation monograph series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Prepared for the Department of Homeland Security."</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"MG-481-DHS"--Page 4 of cover</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 139-153).</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Ch. 1: Introduction -- ch. 2: Palestinian terrorist groups -- ch. 3: Jemaah Islamiyah and affiliated groups -- ch. 4: Liberation Tigers of Tamil Eelam -- ch. 5: Provisional Irish Republican Army -- ch. 6: Conclusions: understanding terrorists' countertechnology efforts -- Appendix -- Bibliography.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to target groups? efforts and protect the public from the threat of terrorist violence. Terrorist organizations are acutely aware of government efforts to deploy these systems and actively seek ways to evade or counteract them. This study draws on relevant data from the history of a variety of terroris.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">War on Terrorism, 2001-2009</subfield><subfield code="x">Technology.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Security systems.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85119483</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Terrorism</subfield><subfield code="x">Prevention.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh00007517</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Terrorism</subfield><subfield code="x">Prevention</subfield><subfield code="v">Case studies.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Terrorism</subfield><subfield code="v">Case studies.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">National security.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85090122</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Guerre contre le terrorisme, 2001-2009</subfield><subfield code="x">Technologie.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Systèmes de sécurité.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Terrorisme</subfield><subfield code="x">Prévention.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Terrorisme</subfield><subfield code="x">Prévention</subfield><subfield code="v">Études de cas.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Terrorisme</subfield><subfield code="v">Études de cas.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">security systems.</subfield><subfield code="2">aat</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE</subfield><subfield code="x">Political Freedom & Security</subfield><subfield code="x">Terrorism.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE</subfield><subfield code="x">Terrorism.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">National security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Security systems</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Technology</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Terrorism</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Terrorism</subfield><subfield code="x">Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Terrorismus</subfield><subfield code="2">gnd</subfield><subfield code="0">http://d-nb.info/gnd/4059534-1</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Bekämpfung</subfield><subfield code="2">gnd</subfield><subfield code="0">http://d-nb.info/gnd/4112701-8</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Sicherheitsmaßnahme</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="647" ind1=" " ind2="7"><subfield code="a">War on Terrorism</subfield><subfield code="d">(2001-2009)</subfield><subfield code="2">fast</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39Qhp4vB9HVBC9J8MqvQ8QwjK</subfield></datafield><datafield tag="648" ind1=" " ind2="7"><subfield code="a">2001-2009</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Case studies</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Case studies.</subfield><subfield code="2">lcgft</subfield><subfield code="0">http://id.loc.gov/authorities/genreForms/gf2017026140</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Études de cas.</subfield><subfield code="2">rvmgf</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jackson, Brian A.,</subfield><subfield code="d">1972-</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjM7h9PmCvkHF37bYxMfpX</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2008021357</subfield></datafield><datafield tag="710" ind1="1" ind2=" "><subfield code="a">United States.</subfield><subfield code="b">Department of Homeland Security.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2002051730</subfield></datafield><datafield tag="773" ind1="0" ind2=" "><subfield code="t">Books at JSTOR: Open Access</subfield><subfield code="d">JSTOR</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="t">Breaching the fortress wall.</subfield><subfield code="d">Santa Monica, CA : RAND Homeland Security, 2007</subfield><subfield code="z">0833039148</subfield><subfield code="z">9780833039149</subfield><subfield code="w">(DLC) 2006001721</subfield><subfield code="w">(OCoLC)63125906</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Rand Corporation monograph series.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2008057654</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=213900</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10225503</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">213900</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2745219</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Case studies fast Case studies. lcgft http://id.loc.gov/authorities/genreForms/gf2017026140 Études de cas. rvmgf |
genre_facet | Case studies Case studies. Études de cas. |
id | ZDB-4-EBA-ocn183658196 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:16:13Z |
institution | BVB |
institution_GND | http://id.loc.gov/authorities/names/no2002051730 |
isbn | 9780833042477 0833042475 9781281180902 1281180904 |
language | English |
oclc_num | 183658196 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xxviii, 153 pages) : illustrations, maps |
psigel | ZDB-4-EBA |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | RAND Homeland Security, |
record_format | marc |
series | Rand Corporation monograph series. |
series2 | Rand Corporation monograph series |
spelling | Breaching the fortress wall : understanding terrorist efforts to overcome defensive technologies / Brian A. Jackson [and others]. Santa Monica, CA : RAND Homeland Security, 2007. 1 online resource (xxviii, 153 pages) : illustrations, maps text txt rdacontent computer c rdamedia online resource cr rdacarrier polychrome. rdacc http://rdaregistry.info/termList/RDAColourContent/1003 data file Rand Corporation monograph series "Prepared for the Department of Homeland Security." "MG-481-DHS"--Page 4 of cover Includes bibliographical references (pages 139-153). Print version record. Ch. 1: Introduction -- ch. 2: Palestinian terrorist groups -- ch. 3: Jemaah Islamiyah and affiliated groups -- ch. 4: Liberation Tigers of Tamil Eelam -- ch. 5: Provisional Irish Republican Army -- ch. 6: Conclusions: understanding terrorists' countertechnology efforts -- Appendix -- Bibliography. The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to target groups? efforts and protect the public from the threat of terrorist violence. Terrorist organizations are acutely aware of government efforts to deploy these systems and actively seek ways to evade or counteract them. This study draws on relevant data from the history of a variety of terroris. War on Terrorism, 2001-2009 Technology. Security systems. http://id.loc.gov/authorities/subjects/sh85119483 Terrorism Prevention. http://id.loc.gov/authorities/subjects/sh00007517 Terrorism Prevention Case studies. Terrorism Case studies. National security. http://id.loc.gov/authorities/subjects/sh85090122 Guerre contre le terrorisme, 2001-2009 Technologie. Systèmes de sécurité. Terrorisme Prévention. Terrorisme Prévention Études de cas. Terrorisme Études de cas. security systems. aat POLITICAL SCIENCE Political Freedom & Security Terrorism. bisacsh POLITICAL SCIENCE Terrorism. bisacsh National security fast Security systems fast Technology fast Terrorism fast Terrorism Prevention fast Terrorismus gnd http://d-nb.info/gnd/4059534-1 Bekämpfung gnd http://d-nb.info/gnd/4112701-8 Sicherheitsmaßnahme gnd War on Terrorism (2001-2009) fast https://id.oclc.org/worldcat/entity/E39Qhp4vB9HVBC9J8MqvQ8QwjK 2001-2009 fast Case studies fast Case studies. lcgft http://id.loc.gov/authorities/genreForms/gf2017026140 Études de cas. rvmgf Jackson, Brian A., 1972- https://id.oclc.org/worldcat/entity/E39PCjM7h9PmCvkHF37bYxMfpX http://id.loc.gov/authorities/names/n2008021357 United States. Department of Homeland Security. http://id.loc.gov/authorities/names/no2002051730 Books at JSTOR: Open Access JSTOR Print version: Breaching the fortress wall. Santa Monica, CA : RAND Homeland Security, 2007 0833039148 9780833039149 (DLC) 2006001721 (OCoLC)63125906 Rand Corporation monograph series. http://id.loc.gov/authorities/names/no2008057654 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=213900 Volltext |
spellingShingle | Breaching the fortress wall : understanding terrorist efforts to overcome defensive technologies / Rand Corporation monograph series. Ch. 1: Introduction -- ch. 2: Palestinian terrorist groups -- ch. 3: Jemaah Islamiyah and affiliated groups -- ch. 4: Liberation Tigers of Tamil Eelam -- ch. 5: Provisional Irish Republican Army -- ch. 6: Conclusions: understanding terrorists' countertechnology efforts -- Appendix -- Bibliography. War on Terrorism, 2001-2009 Technology. Security systems. http://id.loc.gov/authorities/subjects/sh85119483 Terrorism Prevention. http://id.loc.gov/authorities/subjects/sh00007517 Terrorism Prevention Case studies. Terrorism Case studies. National security. http://id.loc.gov/authorities/subjects/sh85090122 Guerre contre le terrorisme, 2001-2009 Technologie. Systèmes de sécurité. Terrorisme Prévention. Terrorisme Prévention Études de cas. Terrorisme Études de cas. security systems. aat POLITICAL SCIENCE Political Freedom & Security Terrorism. bisacsh POLITICAL SCIENCE Terrorism. bisacsh National security fast Security systems fast Technology fast Terrorism fast Terrorism Prevention fast Terrorismus gnd http://d-nb.info/gnd/4059534-1 Bekämpfung gnd http://d-nb.info/gnd/4112701-8 Sicherheitsmaßnahme gnd |
subject_GND | http://id.loc.gov/authorities/subjects/sh85119483 http://id.loc.gov/authorities/subjects/sh00007517 http://id.loc.gov/authorities/subjects/sh85090122 http://d-nb.info/gnd/4059534-1 http://d-nb.info/gnd/4112701-8 http://id.loc.gov/authorities/genreForms/gf2017026140 |
title | Breaching the fortress wall : understanding terrorist efforts to overcome defensive technologies / |
title_auth | Breaching the fortress wall : understanding terrorist efforts to overcome defensive technologies / |
title_exact_search | Breaching the fortress wall : understanding terrorist efforts to overcome defensive technologies / |
title_full | Breaching the fortress wall : understanding terrorist efforts to overcome defensive technologies / Brian A. Jackson [and others]. |
title_fullStr | Breaching the fortress wall : understanding terrorist efforts to overcome defensive technologies / Brian A. Jackson [and others]. |
title_full_unstemmed | Breaching the fortress wall : understanding terrorist efforts to overcome defensive technologies / Brian A. Jackson [and others]. |
title_short | Breaching the fortress wall : |
title_sort | breaching the fortress wall understanding terrorist efforts to overcome defensive technologies |
title_sub | understanding terrorist efforts to overcome defensive technologies / |
topic | War on Terrorism, 2001-2009 Technology. Security systems. http://id.loc.gov/authorities/subjects/sh85119483 Terrorism Prevention. http://id.loc.gov/authorities/subjects/sh00007517 Terrorism Prevention Case studies. Terrorism Case studies. National security. http://id.loc.gov/authorities/subjects/sh85090122 Guerre contre le terrorisme, 2001-2009 Technologie. Systèmes de sécurité. Terrorisme Prévention. Terrorisme Prévention Études de cas. Terrorisme Études de cas. security systems. aat POLITICAL SCIENCE Political Freedom & Security Terrorism. bisacsh POLITICAL SCIENCE Terrorism. bisacsh National security fast Security systems fast Technology fast Terrorism fast Terrorism Prevention fast Terrorismus gnd http://d-nb.info/gnd/4059534-1 Bekämpfung gnd http://d-nb.info/gnd/4112701-8 Sicherheitsmaßnahme gnd |
topic_facet | War on Terrorism, 2001-2009 Technology. Security systems. Terrorism Prevention. Terrorism Prevention Case studies. Terrorism Case studies. National security. Guerre contre le terrorisme, 2001-2009 Technologie. Systèmes de sécurité. Terrorisme Prévention. Terrorisme Prévention Études de cas. Terrorisme Études de cas. security systems. POLITICAL SCIENCE Political Freedom & Security Terrorism. POLITICAL SCIENCE Terrorism. National security Security systems Technology Terrorism Terrorism Prevention Terrorismus Bekämpfung Sicherheitsmaßnahme Case studies Case studies. Études de cas. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=213900 |
work_keys_str_mv | AT jacksonbriana breachingthefortresswallunderstandingterroristeffortstoovercomedefensivetechnologies AT unitedstatesdepartmentofhomelandsecurity breachingthefortresswallunderstandingterroristeffortstoovercomedefensivetechnologies |