Books

20+ results found
Title Authors Description OpenBook ID
Responding to terrorism Responding to terrorism Robert Imre Terrorism and political violence as a field is growing and expanding. This volume, however, provides a cross-disciplinary analysis - political, philosophical and legal - in a single text and will app… OL12047113W
World at risk World at risk Commission on the Prevention of Weapons of Mass Destruction Proliferation and Terrorism (U.S.) The Commission believes that unless the world community acts decisively and with great urgency, it is more likely than not that a weapon of mass destruction will be used in a terrorist attack somewhe… OL13746931W
Criminologists on terrorism and homeland security Criminologists on terrorism and homeland security Brian Forst "This volume presents 19 original essays addressing what is widely regarded as the most serious problem confronting America today and for years to come - terrorism - from the unique perspective of cr… OL15415382W
Major Farran's hat Major Farran's hat David Cesarani Explores why Britain lost Palestine, linking its counterinsurgency and diplomatic strategies through the role of Roy Farran, commander of British counterterrorism squads, to the abduction of a Jewish… OL15449167W
9-11 9-11 Noam Chomsky **9-11** is a collection of essays by and interviews with Noam Chomsky first published in November 2001 in the aftermath of the terrorist attacks on the World Trade Center. The revised edition of 201… OL15834292W
Unconquerable nation Unconquerable nation Brian Michael Jenkins The author presents a clear-sighted and sobering analysis of where we are today in the struggle against terrorism. Jenkins, an internationally renowned authority on terrorism, distills the jihadists'… OL15857416W
Taking liberties Taking liberties Susan N. Herman "Since 9/11, the U.S. government has acted in a variety of ways--some obvious, some nearly invisible--to increase its surveillance and detention power over American citizens and residents. While mos… OL15941804W
High-value target High-value target Edmund J. Hull Since its inception, al Qaeda has aspired to create a safe haven in Yemen,where it has operated against U.S. and Yemeni interests. From 2001 to 2004, when Edmund J. Hull was the American ambassador t… OL15980042W
Policing global movement Policing global movement S. Caroline Taylor,Daniel Joseph Torpy,Das, Dilip K. "This book builds on the tradition of previous volumes produced from annual International Police Executive Symposium (IPES) meetings. Three sections highlight the themes of tourism; trafficking; stra… OL16704852W
Making sense of transnational threats Making sense of transnational threats Gregory F. Treverton Presents the reports from four workshops focused on how to better integrate alternative analysis into the analytic process as it relates to transnational issues. OL1695222W
Dark Territory Dark Territory Kaplan, Fred In June 1983, President Reagan watched the movie War Games, in which a teenager unwittingly hacks the Pentagon, and asked his top general if the scenario was plausible. The general said it was. This … OL17746407W
The 15:17 to Paris The 15:17 to Paris Anthony Sadler "On August 21, 2015, Ayoub al-Khazzani boarded the 15:17 train in Brussels, bound for Paris. Khazzani's mission was clear: he had an AK-47, a pistol, a box cutter, and enough ammunition to obliterate… OL17948621W
Mumbai post 26/11 Mumbai post 26/11 Ram Puniyani xxxiv, 154 p. ; 19 cm OL18554307W
Inside the enemy's computer Inside the enemy's computer Clement Guitton Attribution -- tracing those responsible for a cyber attack -- is of primary importance when classifying it as a criminal act, an act of war, or an act of terrorism. Three assumptions dominate curren… OL19754432W
Counterterrorism and Cybersecurity Counterterrorism and Cybersecurity Newton Lee Imagine James Bond meets Sherlock Holmes: Counterterrorism and Cybersecurity is the sequel to Facebook Nation in the Total Information Awareness book series by Newton Lee. The book examines U.S. coun… OL19838272W
Mining Social Networks and Security Informatics Mining Social Networks and Security Informatics Tansel Özyer Crime, terrorism and security are in the forefront of current societal concerns. This edited volume presents research based on social network techniques showing how data from crime and terror network… OL19888333W
Spying on democracy Spying on democracy Heidi Boghosian "Personal information contained in your emails, phone calls, GPS movements and social media is a hot commodity, and corporations are cashing in by mining and selling the data they collect about our p… OL19968860W
Mainstreaming torture Mainstreaming torture Rebecca Gordon "The terrorist attacks of September 11, 2001 reopened what many people in this country had long assumed was a settled ethical question: Is torture ever morally permissible? Within days, some people i… OL19992400W
World at Risk World at Risk Ulrich Beck 'World at Risk' is a timely and far-reaching analysis of the structural dynamics of the modern world, the global nature of risk and the future of global politics by one of the most original and excit… OL21523745W
The One Percent Doctrine The One Percent Doctrine Ron Suskind What is the guiding principle of the world's most powerful nation as it searches for enemies at home and abroad? Who is actually running U.S. foreign policy? The story begins on September 12, 2001, a… OL2755490W
Next page