Search Images Maps Play YouTube News Gmail Drive More »
Sign in
Books Books 1 - 10 of about 45 related to Breaching the Fortress Wall: Understanding Terrorist Efforts to Overcome ....   

Evaluating Novel Threats to the Homeland: Unmanned Aerial Vehicles and ...

Brian A. Jackson, Dave Frelinger - Political Science - 2008 - 106 pages
Develops approaches for assessing asymmetric attacks using cruise missiles or unmanned aerial vehicles, a novel potential threat to homeland targets, in the context of other ...
Limited preview - About this book

Aptitude for Destruction, Volume 2: Case Studies of Organizational ..., Volume 2

Brian A. Jackson, John C. Baker, Peter Chalk, Kim Cragin, John V. Parachini - Political Science - 2005 - 214 pages
Better ways are needed to understand how terrorist groups increase their effectiveness and become more dangerous. Learning is the link between what a group wants to do and its ...
Limited preview - About this book

Sharing the Dragon's Teeth: Terrorist Groups and the Exchange of New ...

Kim Cragin, Peter Chalk, Sara A. Daly, Brian A. Jackson - Political Science - 2007 - 136 pages
Case studies of 11 terrorist groups in Mindanao, the West Bank and Gaza Strip, and southwest Colombia show how these groups have exchanged technologies and knowledge in an ...
Limited preview - About this book

Aptitude for Destruction, Volume 1: Organizational Learning in Terrorist ...

Brian A. Jackson, John C. Baker, Peter Chalk, Kim Cragin, John V. Parachini - Political Science - 2005 - 104 pages
Better ways are needed to understand how terrorist groups become more effective and dangerous. Learning is the link between what a group wants to do and its ability to actually ...
Limited preview - About this book

Considering the Creation of a Domestic Intelligence Agency in the United ...

Brian A. Jackson - Political Science - 2009 - 194 pages
With terrorism still prominent on the U.S. agenda, whether the country1s prevention efforts match the threat the United States faces continues to be central in policy debate ...
Limited preview - About this book

How Do We Know What Information Sharing Is Really Worth? Exploring ...

Brian A. Jackson - Computers - 2014 - 32 pages
The sharing of intelligence and law enforcement information is a central part of U.S. domestic security efforts, yet there are concerns about the effectiveness of information ...
Limited preview - About this book

Securing America's Passenger-Rail Systems

Jeremy M. Wilson, Brian A. Jackson, Mel Eisman, Paul Steinberg, K. Jack Riley - Political Science - 2007 - 142 pages
U.S. communities depend on reliable, safe, and secure rail systems. Each weekday, more than 12 million passengers take to U.S. railways. This book explains a framework for ...
Limited preview - About this book

Stealing the Sword: Limiting Terrorist Use of Advanced Conventional Weapons

James Bonomo, Giacomo Bergamo, David R. Frelinger, John IV Gordon, Brian A. Jackson, John Gordon IV - Political Science - 2007 - 154 pages
Examines how terrorists make technology choices and how the United States can discourage terrorists' use of advanced conventional weapons. Concludes that the United States ...
Limited preview - About this book

Network Technologies for Networked Terrorists: Assessing the Value of ...

Bruce W. Don - Political Science - 2007 - 80 pages
Terrorist organizations use many technologies as they plan and stage attacks. This book explores the purpose and manner of the use of communication and computer technologies ...
Limited preview - About this book




  1. My library
  2. Help
  3. Advanced Book Search