Academic literature on the topic 'Terrorism Terrorism National security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Terrorism Terrorism National security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Terrorism Terrorism National security"

1

Ali Suleymanova, Aytaj. "ASSESSMENT OF THE DIFFERENCES BETWEEN THE INTERNATIONAL CONVENTION FOR THE SUPPRESSION OF THE FINANCING OF TERRORISM AND THE UNITED NATIONS SECURITY COUNCIL RESOLUTION 1373." SCIENTIFIC WORK 61, no. 12 (2020): 133–35. http://dx.doi.org/10.36719/2663-4619/61/133-135.

Full text
Abstract:
Terrorism financing is a global phenomenon that not only threatens States’ security, but can also undermine economic development and financial market stability. Terrorists require financing to recruit and support members and conduct operations. Thus, preventing terrorists from accessing financial resources is crucial to successfully counter the threat of terrorism. It is therefore of highest importance to stop the flow of funds to terrorists. The article describes the core elements of the main international instruments on the field of the fight against terrorist financing, similarities and dif
APA, Harvard, Vancouver, ISO, and other styles
2

Ефремов, Андрей, and Andrey Efremov. "THE DEVELOPMENT OF THE USA LEGISLATION ON THE FIGHT AGAINST TERRORISM AFTER 11 SEPTEMBER 2001." Journal of Foreign Legislation and Comparative Law 3, no. 3 (2017): 86–92. http://dx.doi.org/10.12737/article_593fc343c391e2.71878517.

Full text
Abstract:
The article is devoted to development of the USA legislation on the fight against terrorism. The author considered the objectives and tasks of the state in a particular historical period; analyzed the laws passed by the USA Congress aimed at combating home and international terrorism; identifies the main directions of the state policy of the USA in the field of counter-terrorism. The article covers the events after 11 September 2001 to the present. The author gives a brief overview of the events of 11 September 2001, discusses the Patriot Act and other laws, aimed at combating terrorism. The P
APA, Harvard, Vancouver, ISO, and other styles
3

Kustana, Tatan. "Islamic terrorism in Indonesia: Addressing Government Strategies and Muslim Population." Jurnal Pertahanan 3, no. 2 (2017): 77. http://dx.doi.org/10.33172/jp.v3i2.145.

Full text
Abstract:
<p><em>This paper shows how Terrorism has been emerging in the world, the potency to be spread out in the South-East Asian nations, and how Indonesia could face internal challenges to do counter-terrorism of the false Jihad, with multitrack diplomacy, primarily with Police and National Agency for Combating Terrorism counter-terrorism programs. In the perspective of defense strategy, the issue of terrorism brings several implications (Indonesian White Paper 2008, p. 9). The condition of Indonesian community with low educational levels and low economic income becomes target for terro
APA, Harvard, Vancouver, ISO, and other styles
4

Priyanto, Sapto, Mohammad Dermawan, and Arthur Runturambi. "Prevention of Terrorism Attacks by Identifying Terrorist Activities." International Journal of Smart Security Technologies 7, no. 1 (2020): 49–57. http://dx.doi.org/10.4018/ijsst.2020010104.

Full text
Abstract:
Terrorism causes material and non-material losses for affected victims of that attack. Victims of terrorist attacks are not only immediate victims, but also indirect victims. Terrorist attacks can be prevented if terrorist activities are identified in advance. This research differs from previous studies because it identifies terrorist activities before the attack. People's attention to safety in their environment can also play a role in anticipating terrorist attacks. Based on chronology with a chronological analysis, it is possible to know that the perpetrators conducted a survey on the targe
APA, Harvard, Vancouver, ISO, and other styles
5

Cassim, Fawzia. "Addressing the spectre of cyber terrorism: a comparative perspective." Potchefstroom Electronic Law Journal/Potchefstroomse Elektroniese Regsblad 15, no. 2 (2017): 380. http://dx.doi.org/10.17159/1727-3781/2012/v15i2a2494.

Full text
Abstract:
This article looks at the definition of cyber terrorism and terrorist use of the Internet. The article evaluates cyber terrorist threats facing countries such as the United States of America, the United Kingdom, India and South Africa. The article also examines measures introduced by the respective governments in these countries to counteract cyber terrorist threats. Finally, the article will propose a way forward to counteract such possible threats in the future. The face of terrorism is changing. The convergence of the physical and virtual worlds has resulted in the creation of a “new threat
APA, Harvard, Vancouver, ISO, and other styles
6

Nazim qızı Vəlişova, Leyla. "Sources of terrorist funding." SCIENTIFIC WORK 65, no. 04 (2021): 170–73. http://dx.doi.org/10.36719/2663-4619/65/170-173.

Full text
Abstract:
The article is devoted to financial sources of terrorism. As money laundering, financing terrorism financial crimes undermine the political and economic interests of jurisdictions and pose a serious threat to national security. The sources of terrorist funding vary. Key words: terrorism, terrorist organization, finance
APA, Harvard, Vancouver, ISO, and other styles
7

Babington-Ashaye, Adejoké. "Prioritizing Accountability for Sexual Terrorism on the Global Peace and Security Agenda: An Assessment of the Way Forward from National Prosecutions of Sexual Terrorism by Boko Haram to Security Council Decisiveness." Journal of Human Trafficking, Enslavement and Conflict-Related Sexual Violence 1, no. 2 (2020): 199–227. http://dx.doi.org/10.7590/266644720x16061196655052.

Full text
Abstract:
Twenty years after the United Nations (UN) Security Council adopted Resolution 1325 on women, peace and security and twenty-five years after the Beijing Declaration and Platform for Action, the prevalence of sexual violence by parties to armed conflicts continues unabated. Despite the responsibility of every State to address such crimes, conflict-related sexual violence has not been met with corresponding accountability. At the same time, national prosecutions of terrorist activities have largely focused on membership and financing of terrorist groups. Even though the majority of States have e
APA, Harvard, Vancouver, ISO, and other styles
8

Ladjide, Suharto, Pujo Widodo, and Resmanto Widodo Putro. "Indonesian National Security Policy in Fighting Terrorism Among the Youth Generation." Asian Social Science 17, no. 10 (2021): 18. http://dx.doi.org/10.5539/ass.v17n10p18.

Full text
Abstract:
At the beginning of the 21st century, Indonesia was marked by terrorist attacks that caused victims, such as the Bali Bombings in 2002. The threat and violence of terrorism cannot be separated from the influence of international terrorist organizations that attack Indonesia through targeted attacks on vulnerable individuals or groups, more specifically the youth generation. The perpetrators of terrorism have taken advantage of the technological network of the online radicalization era. The Industrial Revolution 4.0 has inspired many patterns of human interaction from domestic interactions to g
APA, Harvard, Vancouver, ISO, and other styles
9

Helzhynskyi, A. Yu. "Legal Regulation of Interaction of Security Service of Ukraine with Civil Society in Counteracting Terrorism." Law and Safety 74, no. 3 (2019): 10–17. http://dx.doi.org/10.32631/pb.2019.3.01.

Full text
Abstract:
The relevance of the research is determined by the prerequisites for the rise in the levels of terrorist threats in Ukraine and the development of international terrorism. In response to these threats, the state creates protective mechanisms, increasing the level of protection of the population, since this is one of its main tasks. However, this system does not fully meet its objectives without cooperation with civil society. That is why, one of the current tasks is to unite the efforts of the state and civil society institutions in fighting against terrorism.
 Every citizen and civil soc
APA, Harvard, Vancouver, ISO, and other styles
10

Da’san, Hamza Mohammad, and Rula Odeh Alsawalqa. "The Relationship between University Students’ Perceptions of Terrorism and Academic Specializations." Journal of Educational and Social Research 11, no. 4 (2021): 302. http://dx.doi.org/10.36941/jesr-2021-0096.

Full text
Abstract:
By conducting a set of quantitative surveys, this study aimed to detecting the correlation between Jordanian University students’ perceptions of terrorism and a variety of demographic variables. The results revealed that the majority of students viewed terrorism as the most heinous crime, and is never justified, and that terrorists are hard-core criminals, separatist groups that want to weaken the unity of the country. Therefore, they should be treated as traitors and punished as they pose a threat to national interest, and the safety and security of citizens. While a few of student indicated
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Terrorism Terrorism National security"

1

Funes, Ponce Rayne E. "Honduras' national security strategy to combat terrorism." Monterey, Calif. : Naval Postgraduate School, 2006. http://bosun.nps.edu/uhtbin/hyperion.exe/06Dec%5FFunes%5FPonce.pdf.

Full text
Abstract:
Thesis (M.S. in Defense Analysis)--Naval Postgraduate School, December 2006.<br>Thesis Advisor(s): Douglas Borer. "December 2006." Includes bibliographical references (p. 85-88). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
2

Funes, Ponce Raynel E. "Honduras' national security strategy to combat terrorism." Thesis, Monterey California. Naval Postgraduate School, 2006. http://hdl.handle.net/10945/2499.

Full text
Abstract:
After the September 11 attacks, Honduras committed to support the GWOT, but priorities in national objectives other than terrorism have kept the Honduran government from developing a strategy and the necessary counterterrorism infrastructure to combat this emerging threat. This research examines current threats in Latin America and Honduras in particular. It also suggests a developmental strategy to enhance the country[alpha]s capabilities to combat terrorism by the employment of instruments of national power in a multidimensional way capable to prevent, deter, and respond to terrorist acts. T
APA, Harvard, Vancouver, ISO, and other styles
3

Johnston, Robert W. "The resiliency of terrorist havens : a social mobilization theory approach /." Thesis, Monterey, Calif. : Naval Postgraduate School, 2006. http://bosun.nps.edu/uhtbin/hyperion.exe/06Dec%5FJohnston.pdf.

Full text
Abstract:
Thesis (M.A. in National Security Affairs)--Naval Postgraduate School, December 2006.<br>Thesis Advisor(s): Letitia L. Lawson. "December 2006." AD-A462 614. Includes bibliographical references (p.67-75). Also available via the World Wide Web.
APA, Harvard, Vancouver, ISO, and other styles
4

Noonan, Alexander Peter. "Anarchist Terrorism and American National Security, 1881-1903:." Thesis, Boston College, 2019. http://hdl.handle.net/2345/bc-ir:108596.

Full text
Abstract:
Thesis advisor: Seth Jacobs<br>This dissertation examines the intersections of transnational anarchist terrorism, American foreign relations, and national security in the late nineteenth and early twentieth centuries. As such, the primary purpose is to examine how cultural concerns exert an influence over discussions of national security in the United States. In the face of an unprecedented wave of bombings and assassinations around the world, Americans made clear that anarchist terrorism was a dual menace. First, the actual threat of violence posed an external security problem that needed to
APA, Harvard, Vancouver, ISO, and other styles
5

Marks, Steven M. Meer Thomas M. Nilson Matthew T. "Manhunting : a methodology for finding persons of national interest /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Jun%5FMarks.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Parker, John. "America's holy war : thesis /." Norfolk, Va. : Joint Forces Staff College, Joint Advanced Warfighting School, 2006. http://handle.dtic.mil/100.2/ADA451269.

Full text
Abstract:
Thesis (M.S. in Joint Campaign Planning and Strategy)--Joint Forces Staff College, Joint Advanced Warfighting School, 2006.<br>"14 April 2006." "National Defense Univ Norfolk VA"--DTIC cover. Vita. Includes bibliographical references (p. 65-68). Also available via the Internet.
APA, Harvard, Vancouver, ISO, and other styles
7

Nilson, Matthew T., Steven Marks, and Thomas Meer. "Manhunting : a methodology for finding persons of national interest." Thesis, Monterey, California. Naval Postgraduate School, 2005. http://hdl.handle.net/10945/1921.

Full text
Abstract:
The asymmetrical threats that challenge U.S. national policies are not large standing armies, but rather individuals who seek to usurp and coerce U.S. national interests. The nature of today's threats call for the U.S. military to change from finding, fixing, and destroying the enemy's forces to identifying, locating and capturing rogue individuals in order to destroy networks. To counter such threats, the USG will have to quickly and efficiently identify and find these targets globally. Unfortunately, no military doctrine, framework or process currently exists for finding and apprehendin
APA, Harvard, Vancouver, ISO, and other styles
8

Cox, Anthony A. "Improbable success risk communication and the terrorism hazard /." Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Mar/10Mar%5FCox.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, March 2010.<br>Thesis Advisor(s): Woolman, Lauren F. Second Reader: Gordon, Ellen M. "March 2010." Description based on title screen as viewed on April 26, 2010. Author(s) subject terms: Advisory system, Education, Homeland Security, Intelligence, Politics, Psychology, Public Warning, Risk Commpunication, Sociology, Technology, Terrorism. Includes bibliographical references (p. 47-59). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
9

Farr, Matthew A. "Homeland Security lessons for the United States /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FFarr.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Broughton, Hubert Lee. "Combating terrorism: a guide for U.S. Naval forces afloat." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1985. http://handle.dtic.mil/100.2/ADA164863.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Terrorism Terrorism National security"

1

Service, Canadian Security Intelligence. Trends in terrorism =: Tendances du terrorisme. Canadian Security Intelligence Service = Service canadien du renseignement de sécurité, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Healey, Justin. Terrorism and national security. Spinney Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Patton, Kerry. Terrorism, intelligence & national security. AuthorHouse, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Terrorism and security. Chelsea House Publishers, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rao, Narayan Singh. Global terrorism and security. Mittal Publications, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mewar Institute of Management (Ghāziabād, India), ed. Global terrorism and security. Mittal Publications, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kallen, Stuart A. National security. ReferencePoint Press, Inc., 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Terrorism and homeland security. 7th ed. Wadsworth Cengage Learning, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

White, Jonathan Randall. Terrorism and homeland security. 7th ed. Wadsworth Cengage Learning, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

United Service Institution of India, ed. Countering transnational terrorism. Vij Books India, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Terrorism Terrorism National security"

1

Michaelides-Mateou, Sofia. "Terrorism and National Security." In Information Technology and Law Series. T.M.C. Asser Press, 2016. http://dx.doi.org/10.1007/978-94-6265-132-6_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Snow, Donald M. "Residues of 9/11: Terrorism, Iraq, and Afghanistan." In National Security. Routledge, 2019. http://dx.doi.org/10.4324/9780429427923-14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Nacos, Brigitte L. "Terrorism and America’s Post-9/11 National Security Strategy." In Terrorism and Counterterrorism. Routledge, 2019. http://dx.doi.org/10.4324/9780429455100-10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mercurio, Andrea, and Madeleine Logan. "National Security: An Integration." In International Handbook of War, Torture, and Terrorism. Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-1638-8_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jackson, Richard, and Daniela Pisoiu. "Is terrorism a serious threat to international and national security?" In Contemporary Debates on Terrorism. Routledge, 2018. http://dx.doi.org/10.4324/9781315679785-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Tauber, Steven, and Christopher P. Banks. "Civil Rights and Liberties with National Security." In International Human Rights and Counter-Terrorism. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-10-3894-5_24-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Tauber, Steven, and Christopher P. Banks. "Civil Rights and Liberties with National Security." In International Human Rights and Counter-Terrorism. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-10-4181-5_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Groves, Lauren, and Andrea Mercurio. "Introduction to National Security Coding System." In International Handbook of War, Torture, and Terrorism. Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-1638-8_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Dalley, Mahlon, Jacqui Akhurst, Davies Banda, et al. "Views on National Security in Africa." In International Handbook of War, Torture, and Terrorism. Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-1638-8_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Corgan, Michael, Helena Castanheira, Albertina Aros, et al. "Views on National Security in Western Europe." In International Handbook of War, Torture, and Terrorism. Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-1638-8_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Terrorism Terrorism National security"

1

Nikiforova, Elena Nikolaevna, Evgeniia Pavlovna Gavrilova, and Viktoriia Sergeevna Evdokimova. "Unification of national legislation in the field of countering extremism and terrorism as a factor of international security." In All-Russian scientific and practical conference. Publishing house Sreda, 2019. http://dx.doi.org/10.31483/r-32803.

Full text
Abstract:
The article emphasizes that the fight against extremism and terrorism, as a complex problem, has become one of the priorities in the fight against crime for states at the global and regional levels. The level of development of legal acts in the field of countering extremism and terrorism, the severity of punishment for crimes of extremist and terrorist orientation in some countries are analyzed. It is concluded that in modern legislation of different countries, there is no single approach to the definition of the concepts of "terrorism" and "extremism", there is no uniform approach to the syst
APA, Harvard, Vancouver, ISO, and other styles
2

Reimer, Dennis J., Brian K. Houghton, and Ellen L. Powell. "National Memorial Institute for the Prevention of Terrorism." In Defense and Security, edited by Edward M. Carapezza. SPIE, 2004. http://dx.doi.org/10.1117/12.548162.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Feigel, Richard E. "Terrorism Risk Models: The Need for Common Measures." In ASME 2003 Pressure Vessels and Piping Conference. ASMEDC, 2003. http://dx.doi.org/10.1115/pvp2003-1807.

Full text
Abstract:
From the hot dog vendor located near a national monument to a multinational corporation with operations and significant assets around the world, we are all faced with decisions about addressing terrorism. Since the events of 9/11, enormous amounts of financial and intellectual capital have been invested to develop security responses to potential terrorism threats. Beyond specific, focused initiatives — most visibly increased airport security — a plethora of risk models have been (or are being) developed. Ostensibly, these models attempt to address the basic risk proposition: Risk = Frequency *
APA, Harvard, Vancouver, ISO, and other styles
4

Li, Yanzhao. "National Information Infrastructure Security and Cyber Terrorism in the Process of Industrializations." In 2009 Fifth International Conference on Information Assurance and Security (IAS). IEEE, 2009. http://dx.doi.org/10.1109/ias.2009.132.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Yunos, Zahri, and Syahrul Hafidz Suid. "Protection of Critical National Information Infrastructure (CNII) against cyber terrorism: Development of strategy and policy framework." In 2010 IEEE International Conference on Intelligence and Security Informatics. IEEE, 2010. http://dx.doi.org/10.1109/isi.2010.5484748.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yunos, Zahri, Rabiah Ahmad, Syahrul Hafidz Suid, and Zuraini Ismail. "Safeguarding Malaysia's critical national information infrastructure (CNII) against cyber terrorism: Towards development of a policy framework." In 2010 Sixth International Conference on Information Assurance and Security (IAS). IEEE, 2010. http://dx.doi.org/10.1109/isias.2010.5604182.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ke, Li, Liang Manchun, Su Guofeng, Yang Jie, He Jingtao, and He Shuijun. "The Design of a Nuclear Emergency Decision Deduction and Training Platform." In 2018 26th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/icone26-81691.

Full text
Abstract:
Nuclear accident and nuclear terrorism are of great threats to international security. The countermeasures against nuclear emergency situation should be deliberately considered before it happened. In accordance with experience from Fukushima Daiichi Accident, various kinds of complex situations must be considered at the phase of emergency preparedness. And all related schedules, including national laws and regulations, allocation of responsibility and authority, emergency plans and procedures, facilities, instruments, trainings and exercises must be examined. The appropriateness of the emergen
APA, Harvard, Vancouver, ISO, and other styles
8

Medina, Hector E., and Brian Hinderliter. "Neutron Exposure and Electrical Analysis of P-Type Boron-Doped Silicon Resistors and Transistors." In 2014 22nd International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/icone22-30845.

Full text
Abstract:
Neutron detectors are deployed at ports of entry across the world to monitor people and cargos for smuggled nuclear materials and are often incorporated in nuclear power plant designed to monitor power levels and ensure safe operations. With the supply of Helium-3 rapidly decreasing and due to increase of terrorism threats it is vital to U.S. national security that a viable alternative material be identified, and a new neutron detector design made available, especially for portal monitoring applications. The interest to study Boron-10 as an alternative to helium-3, due to the vast natural supp
APA, Harvard, Vancouver, ISO, and other styles
9

Brachman, Jarret. "Countering terrorism." In 2008 IEEE International Conference on Intelligence and Security Informatics (ISI 2008). IEEE, 2008. http://dx.doi.org/10.1109/isi.2008.4565010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ball, Leslie, and Matthew Craven. "Automated Counter-Terrorism." In 2013 European Intelligence and Security Informatics Conference (EISIC). IEEE, 2013. http://dx.doi.org/10.1109/eisic.2013.48.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Terrorism Terrorism National security"

1

Carter, Robert D. Domestic Terrorism and Our National Security Strategy. Defense Technical Information Center, 1998. http://dx.doi.org/10.21236/ada341465.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Elliott, Joyce E. Cyber Terrorism: A Threat to National Security. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada404381.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Azar, Marwan. Lebanon's National Security Challenges and the Terrorism Phenomenon. Defense Technical Information Center, 2009. http://dx.doi.org/10.21236/ada500792.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Pelletiere, Stephen C. Terrorism: National Security Policy and the Home Front. Defense Technical Information Center, 1995. http://dx.doi.org/10.21236/ada295870.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Green, Jr, and Linwood G. Terrorism and the Communication Utilities: A National Security Concern? Defense Technical Information Center, 1989. http://dx.doi.org/10.21236/ada208668.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Taliento, Michael J., and Jr. Targeting the Leadership of Terrorist Organizations: Policy Considerations for America's National Security Strategy in Combating Global Terrorism. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada402097.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

DeHennis, Philip M. Terrorism: National Security and Strategy and a Local Threat Response. Defense Technical Information Center, 1997. http://dx.doi.org/10.21236/ada329818.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wong, Ming T. Xinjiang and China's National Security: Counter-Terrorism or Counter-Separatism? Defense Technical Information Center, 2003. http://dx.doi.org/10.21236/ada415744.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chambliss, John G. An Assessment of the United States National Security Strategy for Combating Terrorism. Defense Technical Information Center, 2004. http://dx.doi.org/10.21236/ada423313.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Essig, Christopher G. Terrorism: Criminal Act or Act of War Implications for National Security in the 21st Century. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada394661.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!