Amazon cover image
Image from Amazon.com

Breaching the fortress wall : understanding terrorist efforts to overcome defensive technologies / Brian A. Jackson [and others].

Contributor(s): Material type: TextTextSeries: Rand Corporation monograph seriesPublication details: Santa Monica, CA : RAND Homeland Security, 2007.Description: 1 online resource (xxviii, 153 pages) : illustrations, mapsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9780833042477
  • 0833042475
Subject(s): Genre/Form: Additional physical formats: Print version:: Breaching the fortress wall.DDC classification:
  • 363.325/72 22
LOC classification:
  • HV6431 .B737 2007eb
Online resources:
Contents:
Ch. 1: Introduction -- ch. 2: Palestinian terrorist groups -- ch. 3: Jemaah Islamiyah and affiliated groups -- ch. 4: Liberation Tigers of Tamil Eelam -- ch. 5: Provisional Irish Republican Army -- ch. 6: Conclusions: understanding terrorists' countertechnology efforts -- Appendix -- Bibliography.
Summary: The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to target groups? efforts and protect the public from the threat of terrorist violence. Terrorist organizations are acutely aware of government efforts to deploy these systems and actively seek ways to evade or counteract them. This study draws on relevant data from the history of a variety of terroris.
Item type:
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Home library Collection Call number Materials specified Status Date due Barcode
Electronic-Books Electronic-Books OPJGU Sonepat- Campus E-Books EBSCO Available

"Prepared for the Department of Homeland Security."

"MG-481-DHS"--Page 4 of cover

Includes bibliographical references (pages 139-153).

Print version record.

Ch. 1: Introduction -- ch. 2: Palestinian terrorist groups -- ch. 3: Jemaah Islamiyah and affiliated groups -- ch. 4: Liberation Tigers of Tamil Eelam -- ch. 5: Provisional Irish Republican Army -- ch. 6: Conclusions: understanding terrorists' countertechnology efforts -- Appendix -- Bibliography.

The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to target groups? efforts and protect the public from the threat of terrorist violence. Terrorist organizations are acutely aware of government efforts to deploy these systems and actively seek ways to evade or counteract them. This study draws on relevant data from the history of a variety of terroris.

eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - Worldwide

There are no comments on this title.

to post a comment.

O.P. Jindal Global University, Sonepat-Narela Road, Sonepat, Haryana (India) - 131001

Send your feedback to glus@jgu.edu.in

Hosted, Implemented & Customized by: BestBookBuddies   |   Maintained by: Global Library