Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Santa Monica, CA : RAND Corp
    ISBN: 9780833039651 , 0833042874 , 9781281181268 , 1281181269 , 9780833042873 , 0833039652
    Language: English
    Pages: 1 Online-Ressource (xxvii, 126 pages)
    Parallel Title: Print version Stealing the sword
    DDC: 363.325/16
    Keywords: Terrorism Prevention ; Terrorism Prevention ; Arms control ; Weapons systems ; Terrorism ; Terrorism ; Arms control ; Weapons systems ; POLITICAL SCIENCE ; Security (National & International) ; Arms control ; Terrorism ; Prevention ; Weapons systems ; Armies ; Military & Naval Science ; Law, Politics & Government ; United States ; POLITICAL SCIENCE ; Political Freedom & Security ; Terrorism ; Electronic books
    Abstract: Part of a series examining the technology competition between security organizations and terrorist organizations, this report focuses on understanding how terrorist groups make technology choices and consequently how the United States can discourage their adoption of advanced conventional weapons. Five types of advanced conventional weapons are identified that could provide terrorists with a new and qualitatively different weapon capability: sniper rifles, squad-level weapons, antitank missiles, large limpet mines, and mortar systems. Two key methods of limiting the threat from these systems i
    Abstract: Part of a series examining the technology competition between security organizations and terrorist organizations, this report focuses on understanding how terrorist groups make technology choices and consequently how the United States can discourage their adoption of advanced conventional weapons. Five types of advanced conventional weapons are identified that could provide terrorists with a new and qualitatively different weapon capability: sniper rifles, squad-level weapons, antitank missiles, large limpet mines, and mortar systems. Two key methods of limiting the threat from these systems i
    Note: "MG-510"--Page 4 of cover , Includes bibliographical references (pages 117-126)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...