Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • English  (9)
  • 2000-2004  (9)
  • Rand Corporation  (9)
  • Terrorism  (6)
  • Armies  (3)
Datasource
Material
Language
  • English  (9)
Years
Year
  • 1
    ISBN: 9780833035134 , 0833036149 , 0833035134 , 9780833036148
    Language: English
    Pages: 1 Online-Ressource (xxi, 67 pages)
    Parallel Title: Print version Chalk, Peter Confronting "the enemy within
    Keywords: Australian Security Intelligence Organization ; Canadian Security Intelligence Service ; France ; Great Britain ; Australian Security Intelligence Organization ; Canadian Security Intelligence Service ; France ; Great Britain ; Intelligence service Cross-cultural studies ; Internal security Cross-cultural studies ; Terrorism Cross-cultural studies Prevention ; Intelligence service ; Internal security ; Terrorism ; Electronic books ; France ; POLITICAL SCIENCE ; Political Freedom & Security ; Law Enforcement ; POLITICAL SCIENCE ; Terrorism ; Intelligence service ; Internal security ; Terrorism ; Prevention ; Great Britain ; Cross-cultural studies ; Australian Security Intelligence Organization ; Canadian Security Intelligence Service ; Electronic books
    Abstract: Since the September 11, 2001, terrorist attacks, critics have charged that the Federal Bureau of Investigation, while qualified to investigate terrorist incidents after the fact, is not well equipped enough to adequately gather and assess information to prevent attacks. More intrinsically, many believe that given a predominant and deeply rooted law enforcement and prosecutorial culture, the bureau may not be able to change operational focus toward dedicated counterterrorism intelligence gathering and analysis. To better inform debate, researchers analyzed the domestic security structures of fo
    Abstract: Since the September 11, 2001, terrorist attacks, critics have charged that the Federal Bureau of Investigation, while qualified to investigate terrorist incidents after the fact, is not well equipped enough to adequately gather and assess information to prevent attacks. More intrinsically, many believe that given a predominant and deeply rooted law enforcement and prosecutorial culture, the bureau may not be able to change operational focus toward dedicated counterterrorism intelligence gathering and analysis. To better inform debate, researchers analyzed the domestic security structures of fo
    Note: "MG-100 , Includes bibliographical references (pages 59-66)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Santa Monica, Calif : RAND Corp
    ISBN: 9780833035202 , 0833048171 , 9781598754131 , 1598754130 , 9781282451223 , 1282451227 , 9780833048172 , 0833035207
    Language: English
    Pages: 1 Online-Ressource (xxx, 155 pages)
    Parallel Title: Print version Out of the ordinary
    Keywords: Criminal methods ; Terrorism Forecasting ; Terrorism Psychological aspects ; Intelligence service ; National security ; Crime forecasting ; Criminal behavior, Prediction of ; Criminal methods ; Terrorism ; Terrorism ; Intelligence service ; National security ; Crime forecasting ; Criminal behavior, Prediction of ; POLITICAL SCIENCE ; Political Freedom & Security ; Law Enforcement ; POLITICAL SCIENCE ; Security (National & International) ; Crime forecasting ; Criminal behavior, Prediction of ; Criminal methods ; Intelligence service ; National security ; Terrorism ; Forecasting ; Terrorism ; Psychological aspects ; United States ; Electronic books
    Abstract: Presents a unique appraoch to selecting and assembling disparate pieces of information to produce a general understanding of a threat. The Atypical Signal Analysis and Processing schema identifies atypical behavior potentially related to terror actvity; puts it into context; generates and tests hypotheses; and focuses analysts' attention on the most significant findings. A supporting conceptual architecture and specific techniques for identifying and analyzing out-of-the-ordinary information are also described
    Abstract: Presents a unique appraoch to selecting and assembling disparate pieces of information to produce a general understanding of a threat. The Atypical Signal Analysis and Processing schema identifies atypical behavior potentially related to terror actvity; puts it into context; generates and tests hypotheses; and focuses analysts' attention on the most significant findings. A supporting conceptual architecture and specific techniques for identifying and analyzing out-of-the-ordinary information are also described
    Note: "MG-126-RC , Includes bibliographical references (pages 151-155) and appendices , Title from title screen (viewed 11/23/2004)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9780833034946 , 0833034944 , 9780833036216 , 0833036211 , 9781282451469 , 1282451464
    Language: English
    Pages: 1 Online-Ressource (xx, 106 pages)
    DDC: 303.6/25
    Keywords: Terrorism ; Threats ; Behavioral assessment ; Terrorism ; Terrorists ; Electronic books ; Electronic books ; Electronic books
    Abstract: Introduction -- Assessing terrorist threats -- Terrorist groups' capabilities -- Terrorist groups as dynamic entities -- Conclusion -- Appendix: Trends in terrorist attacks
    Abstract: As the war on terrorism wages on, our nation's policymakers will continue to face the challenge of assessing threats that various terrorist groups pose to the U.S. homeland and our interests abroad. In addition, the struggle against terrorism likely will be in constant competition with other U.S. international policy issues that come to the fore. As part of the RAND Corporation's yearlong "Thinking Strategically About Combating Terrorism" project, the authors of this report develop a way to assess, analyze, and prioritize the danger posed by various terrorist organizations around the world. The authors also look at how different terrorist groups adapt and change over time, emphasizing that understanding these changes may help policymakers identify terrorists' greatest vulnerabilities. Of course, the very nature of terrorism creates a difficulty in predicting new and emerging threats; however, by establishing these types of parameters, the report creates a fresh foundation of threat analysis on which future counterterrorism strategy may build
    URL: Volltext  (Kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    ISBN: 9780833032607 , 0833048341 , 9781282451209 , 1282451200 , 9781598751192 , 1598751190 , 9780833048349 , 0833032607
    Language: English
    Pages: 1 Online-Ressource (xxvii, 379 pages)
    Series Statement: Online Rand research documents
    Parallel Title: Print version Faultlines of conflict in Central Asia and the south Caucasus
    Keywords: United States Foreign service ; United States Foreign service ; United States ; United States ; Armed Forces ; Foreign service ; Military policy ; Strategic aspects of individual places ; Internationale conflicten ; Etnische conflicten ; Militaire politiek ; Armies ; Military & Naval Science ; Law, Politics & Government ; United States ; TECHNOLOGY & ENGINEERING ; Military Science ; Central Asia ; Caucasus ; United States ; HISTORY ; Military ; Other ; POLITICAL SCIENCE ; Political Freedom ; Caucasus Strategic aspects ; United States Military policy ; Asia, Central Strategic aspects ; Caucasus ; United States ; Asia, Central ; Electronic books
    Abstract: Introduction -- The political evolution of Central Asia and South Caucasus: Implications for regional security -- Some economic dimensions of security in Central Asia and South Caucasus -- Natural resources and potential conflict in the Caspian Sea region -- Potential for ethnic conflict in the Caspian Sea region -- Potential for ethnic conflict in the Caspian region -- Conflict in Central Asia and South Caucasus: implications of foreign interests and involvement -- Central Asia and South Caucasus as an area of operations: challenges and constraints -- Sources of conflict and paths to U.S. involvement
    Abstract: Introduction -- The political evolution of Central Asia and South Caucasus: Implications for regional security -- Some economic dimensions of security in Central Asia and South Caucasus -- Natural resources and potential conflict in the Caspian Sea region -- Potential for ethnic conflict in the Caspian Sea region -- Potential for ethnic conflict in the Caspian region -- Conflict in Central Asia and South Caucasus: implications of foreign interests and involvement -- Central Asia and South Caucasus as an area of operations: challenges and constraints -- Sources of conflict and paths to U.S. involvement
    Note: Includes bibliographical references (pages 359-379)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Santa Monica, Calif : Rand
    ISBN: 9780833032072 , 0833032232 , 0833032070 , 9780833032232
    Language: English
    Pages: 1 Online-Ressource (52 pages)
    Parallel Title: Print version Karasik, Theodore William Toxic warfare
    DDC: 358/.3
    Keywords: Terrorism ; Biological warfare ; Radioactive wastes War use ; Hazardous substances War use ; Toxins War use ; Poisons War use ; Terrorism ; Biological warfare ; Radioactive wastes ; Hazardous substances ; Toxins ; Poisons ; Chemical Warfare Agents ; Hazardous Substances ; Environmental Exposure ; Weapons ; Poisons ; Environmental Pollutants ; Environmental Pollution ; Armed Conflicts ; Weapons of Mass Destruction ; Violence ; Social Problems ; Crime ; Manufactured Materials ; Toxic Actions ; Specialty Uses of Chemicals ; Noxae ; Public Health ; Chemical Actions and Uses ; Criminology ; Environment and Public Health ; Sociology ; Technology, Industry, and Agriculture ; Social Sciences ; Chemicals and Drugs ; Delivery of Health Care ; Technology, Industry, Agriculture ; Anthropology, Education, Sociology and Social Phenomena ; Chemical Warfare ; Chemical Warfare Agents adverse effects ; Environmental Exposure adverse effects ; Hazardous Substances adverse effects ; Terrorism ; Electronic books ; POLITICAL SCIENCE ; International Relations ; Arms Control ; Biological warfare ; Terrorism ; Military Engineering ; Military & Naval Science ; Law, Politics & Government ; HISTORY ; Military ; Biological & Chemical Warfare ; United States ; Electronic books
    Abstract: Since the 1990s there has been an increase in the use of toxic weapons; for example, inexpensive and easily acquired chemicals and industrial waste. This work examines the implications of toxic weapon use for military planning and concludes that such weapons merit further analysis
    Abstract: Since the 1990s there has been an increase in the use of toxic weapons; for example, inexpensive and easily acquired chemicals and industrial waste. This work examines the implications of toxic weapon use for military planning and concludes that such weapons merit further analysis
    Note: "MR-1572 , Includes bibliographical references (pages 45-52)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    ISBN: 9780833032645 , 0833034073 , 083303264X , 9780833034076
    Language: English
    Pages: 1 Online-Ressource (xi, 30 pages)
    Parallel Title: Print version Jenkins, Brian Michael Countering al Qaeda
    DDC: 363.3/2/0973
    Keywords: Qaida (Organization) ; Qaida (Organization) ; War on Terrorism, 2001-2009 ; Terrorism Government policy ; Terrorism ; War on Terrorism, 2001-2009 ; Terrorism ; Terrorism ; POLITICAL SCIENCE ; International Relations ; General ; War on Terrorism (2001-2009) ; POLITICAL SCIENCE ; Political Freedom & Security ; Law Enforcement ; Military policy ; Terrorism ; Terrorism ; Government policy ; Qaida (Organization) ; United States ; United States Military policy ; United States ; Electronic books
    Abstract: Having achieved its initial goals in the war on terrorism, the United States is now in a second, more complex phase of the campaign. This monograph reviews events since the attacks of September 11, 2001, and discusses the current state of the al Qaeda organization and the kinds of actions that can be expected of it in the foreseeable future. Because al Qaeda constitutes the most serious immediate threat to the security of the United States, it is imperative that the campaign against terrorism remain focused and pragmatic. This monograph outlines and describes the essential, central elements that must be emphasized in this campaign, the ultimate aim of which is the destruction of a terrorist enterprise that threatens American security and, by extension, the security of the world
    Abstract: Having achieved its initial goals in the war on terrorism, the United States is now in a second, more complex phase of the campaign. This monograph reviews events since the attacks of September 11, 2001, and discusses the current state of the al Qaeda organization and the kinds of actions that can be expected of it in the foreseeable future. Because al Qaeda constitutes the most serious immediate threat to the security of the United States, it is imperative that the campaign against terrorism remain focused and pragmatic. This monograph outlines and describes the essential, central elements that must be emphasized in this campaign, the ultimate aim of which is the destruction of a terrorist enterprise that threatens American security and, by extension, the security of the world
    Note: "MR-1620-RC , Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Santa Monica, Calif : Rand
    ISBN: 9780833031495 , 0833032577 , 083303149X , 9780833032577
    Language: English
    Pages: 1 Online-Ressource (xx, 89 pages)
    Edition: [S.l.] HathiTrust Digital Library 2010 Electronic reproduction
    Series Statement: Conference proceedings 176
    Parallel Title: Print version Protecting emergency responders
    Keywords: Industrial safety Congresses ; Employees Congresses Safety measures ; Protective clothing ; Industrial safety ; Employees ; Protective clothing ; Rescue Work ; Risk Management ; Terrorism ; Protective Devices ; Emergency Medical Technicians ; Occupational Health ; Social Welfare & Social Work - General ; Social Welfare & Social Work ; Technology - General ; TECHNOLOGY & ENGINEERING ; Fire Science ; MEDICAL ; Occupational & Industrial Medicine ; Employees ; Safety measures ; Industrial safety ; Protective clothing ; Engineering & Applied Sciences ; Social Sciences ; Conference papers and proceedings ; United States ; Electronic books ; Congress
    Abstract: Preface; Executive Summary; Acknowledgments; Acronyms and Abbreviations; Chapter One: INTRODUCTION; Chapter Two: THE TERRORIST INCIDENTS; Chapter Three: PERFORMANCE AND AVAILABILITY OF PERSONAL PROTECTIVE EQUIPMENT; Chapter Four: INFORMATION AND TRAINING; Chapter Five: SITE MANAGEMENT FOR PERSONAL PROTECTION; Chapter Six: RECOMMENDATIONS FOR MOVING FORWARD; Chapter Seven: CONCLUDING REMARKS; Appendix A:; Appendix B:; Appendix C:; Appendix D
    Abstract: Preface; Executive Summary; Acknowledgments; Acronyms and Abbreviations; Chapter One: INTRODUCTION; Chapter Two: THE TERRORIST INCIDENTS; Chapter Three: PERFORMANCE AND AVAILABILITY OF PERSONAL PROTECTIVE EQUIPMENT; Chapter Four: INFORMATION AND TRAINING; Chapter Five: SITE MANAGEMENT FOR PERSONAL PROTECTION; Chapter Six: RECOMMENDATIONS FOR MOVING FORWARD; Chapter Seven: CONCLUDING REMARKS; Appendix A:; Appendix B:; Appendix C:; Appendix D
    Note: Includes bibliographical references , Use copy Restrictions unspecified star MiAaHDL , Electronic reproduction , Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    ISBN: 9780833031174 , 0833032283 , 0833031171 , 9780833032287
    Language: English
    Pages: 1 Online-Ressource (xxvi, 179 pages)
    Parallel Title: Print version Hunter, Robert Edwards, 1940- European Security and Defense Policy
    Keywords: North Atlantic Treaty Organization ; North Atlantic Treaty Organization ; Armies ; Military & Naval Science ; Law, Politics & Government ; TECHNOLOGY & ENGINEERING ; Military Science ; Europe ; United States ; HISTORY ; Military ; Other ; POLITICAL SCIENCE ; Security (National & International) ; Military policy ; Military readiness ; North Atlantic Treaty Organization ; Military relations ; United States Military relations ; Europe Defenses ; Europe Military relations ; Europe Military policy ; United States ; Europe ; Europe ; Europe ; Electronic books
    Abstract: The Grand Bargain of Berlin and Brussels -- Beyond Berlin: Devil in the Details (I) -- St. Malo and Beyond -- The Three Ds, and a Fourth -- Defense Capabilities and the Defense Capabilities Initiative -- From Washington to Cologne -- Congress Responds -- The Helsinki Watershed -- After Helsinki: Getting the NATO-EU Relationship Right -- Practical Arrangements: Devil in the Details (II) -- Parallel Tracks -- U.S. Concerns Crystallize -- Nice and Beyond -- The New U.S. Administration -- Sorting It Out -- Striking the Balance: A U.S. View -- Practical Steps: Building a Transatlantic Bridge, Not a Barrier -- Looking to the Future
    Abstract: The Grand Bargain of Berlin and Brussels -- Beyond Berlin: Devil in the Details (I) -- St. Malo and Beyond -- The Three Ds, and a Fourth -- Defense Capabilities and the Defense Capabilities Initiative -- From Washington to Cologne -- Congress Responds -- The Helsinki Watershed -- After Helsinki: Getting the NATO-EU Relationship Right -- Practical Arrangements: Devil in the Details (II) -- Parallel Tracks -- U.S. Concerns Crystallize -- Nice and Beyond -- The New U.S. Administration -- Sorting It Out -- Striking the Balance: A U.S. View -- Practical Steps: Building a Transatlantic Bridge, Not a Barrier -- Looking to the Future
    Note: "Research conducted jointly by RAND Europe and the International Security and Defense Policy Center of RAND's National Defense Research Institute ..."--Page vi , "MR-1463-NDRI/RE , Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    ISBN: 9780833060075 , 0833060074
    Language: English
    Pages: 1 Online-Ressource
    Parallel Title: Print version First year of the Medicare-DoD subvention demonstration
    DDC: 355.3/450973
    Keywords: United States ; United States ; United States - Department of Defense ; United States - Health Care Financing Administration ; Health maintenance organizations ; Health maintenance organizations ; Military Personnel ; Program Evaluation ; Health Maintenance Organizations ; Medicare ; Armed Forces ; Medical care ; Health maintenance organizations ; United States ; Military & Naval Science ; Law, Politics & Government ; Armies ; United States ; United States Armed Forces ; Medical care ; United States ; Electronic books
    Abstract: Preface -- Contents -- Tables -- Figures -- Summary -- Acknowledgements -- Acronyms -- Chapter 1: Introductions -- Chapter 2: The Medicare-DoD subvention demonstration -- Chapter 3: Evaluation methods and data -- Chapter 4: Enrollment demand -- Chapter 5: Early effects of senior prime on service use -- Chapter 6: Early financial effects of senior prime -- Chapter 7: Status of the demonstration sites -- Chapter 8: Discussion of findings and issues -- Chapter 9: Selection of military treatment facilities for senior prime -- References -- Appendix A: Evaluation of the DoD-Medicare subvention demonstration -- Appendix B: FY96-FY98 RAND data documentation -- Appendix C: Teleconferences with the demonstration sites -- Appendix D: DoD medical treatment facilities -- not participants in the subvention -- Demonstration
    Note: "MR-1271.0-HCFA , Cover title , Includes bibliographical references (page 109)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...