Academic literature on the topic 'Terrorism Terrorism National security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Terrorism Terrorism National security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Terrorism Terrorism National security"
Ali Suleymanova, Aytaj. "ASSESSMENT OF THE DIFFERENCES BETWEEN THE INTERNATIONAL CONVENTION FOR THE SUPPRESSION OF THE FINANCING OF TERRORISM AND THE UNITED NATIONS SECURITY COUNCIL RESOLUTION 1373." SCIENTIFIC WORK 61, no. 12 (2020): 133–35. http://dx.doi.org/10.36719/2663-4619/61/133-135.
Full textЕфремов, Андрей, and Andrey Efremov. "THE DEVELOPMENT OF THE USA LEGISLATION ON THE FIGHT AGAINST TERRORISM AFTER 11 SEPTEMBER 2001." Journal of Foreign Legislation and Comparative Law 3, no. 3 (2017): 86–92. http://dx.doi.org/10.12737/article_593fc343c391e2.71878517.
Full textKustana, Tatan. "Islamic terrorism in Indonesia: Addressing Government Strategies and Muslim Population." Jurnal Pertahanan 3, no. 2 (2017): 77. http://dx.doi.org/10.33172/jp.v3i2.145.
Full textPriyanto, Sapto, Mohammad Dermawan, and Arthur Runturambi. "Prevention of Terrorism Attacks by Identifying Terrorist Activities." International Journal of Smart Security Technologies 7, no. 1 (2020): 49–57. http://dx.doi.org/10.4018/ijsst.2020010104.
Full textCassim, Fawzia. "Addressing the spectre of cyber terrorism: a comparative perspective." Potchefstroom Electronic Law Journal/Potchefstroomse Elektroniese Regsblad 15, no. 2 (2017): 380. http://dx.doi.org/10.17159/1727-3781/2012/v15i2a2494.
Full textNazim qızı Vəlişova, Leyla. "Sources of terrorist funding." SCIENTIFIC WORK 65, no. 04 (2021): 170–73. http://dx.doi.org/10.36719/2663-4619/65/170-173.
Full textBabington-Ashaye, Adejoké. "Prioritizing Accountability for Sexual Terrorism on the Global Peace and Security Agenda: An Assessment of the Way Forward from National Prosecutions of Sexual Terrorism by Boko Haram to Security Council Decisiveness." Journal of Human Trafficking, Enslavement and Conflict-Related Sexual Violence 1, no. 2 (2020): 199–227. http://dx.doi.org/10.7590/266644720x16061196655052.
Full textLadjide, Suharto, Pujo Widodo, and Resmanto Widodo Putro. "Indonesian National Security Policy in Fighting Terrorism Among the Youth Generation." Asian Social Science 17, no. 10 (2021): 18. http://dx.doi.org/10.5539/ass.v17n10p18.
Full textHelzhynskyi, A. Yu. "Legal Regulation of Interaction of Security Service of Ukraine with Civil Society in Counteracting Terrorism." Law and Safety 74, no. 3 (2019): 10–17. http://dx.doi.org/10.32631/pb.2019.3.01.
Full textDa’san, Hamza Mohammad, and Rula Odeh Alsawalqa. "The Relationship between University Students’ Perceptions of Terrorism and Academic Specializations." Journal of Educational and Social Research 11, no. 4 (2021): 302. http://dx.doi.org/10.36941/jesr-2021-0096.
Full textDissertations / Theses on the topic "Terrorism Terrorism National security"
Funes, Ponce Rayne E. "Honduras' national security strategy to combat terrorism." Monterey, Calif. : Naval Postgraduate School, 2006. http://bosun.nps.edu/uhtbin/hyperion.exe/06Dec%5FFunes%5FPonce.pdf.
Full textFunes, Ponce Raynel E. "Honduras' national security strategy to combat terrorism." Thesis, Monterey California. Naval Postgraduate School, 2006. http://hdl.handle.net/10945/2499.
Full textJohnston, Robert W. "The resiliency of terrorist havens : a social mobilization theory approach /." Thesis, Monterey, Calif. : Naval Postgraduate School, 2006. http://bosun.nps.edu/uhtbin/hyperion.exe/06Dec%5FJohnston.pdf.
Full textNoonan, Alexander Peter. "Anarchist Terrorism and American National Security, 1881-1903:." Thesis, Boston College, 2019. http://hdl.handle.net/2345/bc-ir:108596.
Full textMarks, Steven M. Meer Thomas M. Nilson Matthew T. "Manhunting : a methodology for finding persons of national interest /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Jun%5FMarks.pdf.
Full textParker, John. "America's holy war : thesis /." Norfolk, Va. : Joint Forces Staff College, Joint Advanced Warfighting School, 2006. http://handle.dtic.mil/100.2/ADA451269.
Full textNilson, Matthew T., Steven Marks, and Thomas Meer. "Manhunting : a methodology for finding persons of national interest." Thesis, Monterey, California. Naval Postgraduate School, 2005. http://hdl.handle.net/10945/1921.
Full textCox, Anthony A. "Improbable success risk communication and the terrorism hazard /." Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Mar/10Mar%5FCox.pdf.
Full textFarr, Matthew A. "Homeland Security lessons for the United States /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FFarr.pdf.
Full textBroughton, Hubert Lee. "Combating terrorism: a guide for U.S. Naval forces afloat." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1985. http://handle.dtic.mil/100.2/ADA164863.
Full textBooks on the topic "Terrorism Terrorism National security"
Service, Canadian Security Intelligence. Trends in terrorism =: Tendances du terrorisme. Canadian Security Intelligence Service = Service canadien du renseignement de sécurité, 2000.
Find full textMewar Institute of Management (Ghāziabād, India), ed. Global terrorism and security. Mittal Publications, 2010.
Find full textWhite, Jonathan Randall. Terrorism and homeland security. 7th ed. Wadsworth Cengage Learning, 2012.
Find full textUnited Service Institution of India, ed. Countering transnational terrorism. Vij Books India, 2011.
Find full textBook chapters on the topic "Terrorism Terrorism National security"
Michaelides-Mateou, Sofia. "Terrorism and National Security." In Information Technology and Law Series. T.M.C. Asser Press, 2016. http://dx.doi.org/10.1007/978-94-6265-132-6_8.
Full textSnow, Donald M. "Residues of 9/11: Terrorism, Iraq, and Afghanistan." In National Security. Routledge, 2019. http://dx.doi.org/10.4324/9780429427923-14.
Full textNacos, Brigitte L. "Terrorism and America’s Post-9/11 National Security Strategy." In Terrorism and Counterterrorism. Routledge, 2019. http://dx.doi.org/10.4324/9780429455100-10.
Full textMercurio, Andrea, and Madeleine Logan. "National Security: An Integration." In International Handbook of War, Torture, and Terrorism. Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-1638-8_21.
Full textJackson, Richard, and Daniela Pisoiu. "Is terrorism a serious threat to international and national security?" In Contemporary Debates on Terrorism. Routledge, 2018. http://dx.doi.org/10.4324/9781315679785-6.
Full textTauber, Steven, and Christopher P. Banks. "Civil Rights and Liberties with National Security." In International Human Rights and Counter-Terrorism. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-10-3894-5_24-1.
Full textTauber, Steven, and Christopher P. Banks. "Civil Rights and Liberties with National Security." In International Human Rights and Counter-Terrorism. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-10-4181-5_24.
Full textGroves, Lauren, and Andrea Mercurio. "Introduction to National Security Coding System." In International Handbook of War, Torture, and Terrorism. Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-1638-8_12.
Full textDalley, Mahlon, Jacqui Akhurst, Davies Banda, et al. "Views on National Security in Africa." In International Handbook of War, Torture, and Terrorism. Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-1638-8_17.
Full textCorgan, Michael, Helena Castanheira, Albertina Aros, et al. "Views on National Security in Western Europe." In International Handbook of War, Torture, and Terrorism. Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-1638-8_13.
Full textConference papers on the topic "Terrorism Terrorism National security"
Nikiforova, Elena Nikolaevna, Evgeniia Pavlovna Gavrilova, and Viktoriia Sergeevna Evdokimova. "Unification of national legislation in the field of countering extremism and terrorism as a factor of international security." In All-Russian scientific and practical conference. Publishing house Sreda, 2019. http://dx.doi.org/10.31483/r-32803.
Full textReimer, Dennis J., Brian K. Houghton, and Ellen L. Powell. "National Memorial Institute for the Prevention of Terrorism." In Defense and Security, edited by Edward M. Carapezza. SPIE, 2004. http://dx.doi.org/10.1117/12.548162.
Full textFeigel, Richard E. "Terrorism Risk Models: The Need for Common Measures." In ASME 2003 Pressure Vessels and Piping Conference. ASMEDC, 2003. http://dx.doi.org/10.1115/pvp2003-1807.
Full textLi, Yanzhao. "National Information Infrastructure Security and Cyber Terrorism in the Process of Industrializations." In 2009 Fifth International Conference on Information Assurance and Security (IAS). IEEE, 2009. http://dx.doi.org/10.1109/ias.2009.132.
Full textYunos, Zahri, and Syahrul Hafidz Suid. "Protection of Critical National Information Infrastructure (CNII) against cyber terrorism: Development of strategy and policy framework." In 2010 IEEE International Conference on Intelligence and Security Informatics. IEEE, 2010. http://dx.doi.org/10.1109/isi.2010.5484748.
Full textYunos, Zahri, Rabiah Ahmad, Syahrul Hafidz Suid, and Zuraini Ismail. "Safeguarding Malaysia's critical national information infrastructure (CNII) against cyber terrorism: Towards development of a policy framework." In 2010 Sixth International Conference on Information Assurance and Security (IAS). IEEE, 2010. http://dx.doi.org/10.1109/isias.2010.5604182.
Full textKe, Li, Liang Manchun, Su Guofeng, Yang Jie, He Jingtao, and He Shuijun. "The Design of a Nuclear Emergency Decision Deduction and Training Platform." In 2018 26th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/icone26-81691.
Full textMedina, Hector E., and Brian Hinderliter. "Neutron Exposure and Electrical Analysis of P-Type Boron-Doped Silicon Resistors and Transistors." In 2014 22nd International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/icone22-30845.
Full textBrachman, Jarret. "Countering terrorism." In 2008 IEEE International Conference on Intelligence and Security Informatics (ISI 2008). IEEE, 2008. http://dx.doi.org/10.1109/isi.2008.4565010.
Full textBall, Leslie, and Matthew Craven. "Automated Counter-Terrorism." In 2013 European Intelligence and Security Informatics Conference (EISIC). IEEE, 2013. http://dx.doi.org/10.1109/eisic.2013.48.
Full textReports on the topic "Terrorism Terrorism National security"
Carter, Robert D. Domestic Terrorism and Our National Security Strategy. Defense Technical Information Center, 1998. http://dx.doi.org/10.21236/ada341465.
Full textElliott, Joyce E. Cyber Terrorism: A Threat to National Security. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada404381.
Full textAzar, Marwan. Lebanon's National Security Challenges and the Terrorism Phenomenon. Defense Technical Information Center, 2009. http://dx.doi.org/10.21236/ada500792.
Full textPelletiere, Stephen C. Terrorism: National Security Policy and the Home Front. Defense Technical Information Center, 1995. http://dx.doi.org/10.21236/ada295870.
Full textGreen, Jr, and Linwood G. Terrorism and the Communication Utilities: A National Security Concern? Defense Technical Information Center, 1989. http://dx.doi.org/10.21236/ada208668.
Full textTaliento, Michael J., and Jr. Targeting the Leadership of Terrorist Organizations: Policy Considerations for America's National Security Strategy in Combating Global Terrorism. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada402097.
Full textDeHennis, Philip M. Terrorism: National Security and Strategy and a Local Threat Response. Defense Technical Information Center, 1997. http://dx.doi.org/10.21236/ada329818.
Full textWong, Ming T. Xinjiang and China's National Security: Counter-Terrorism or Counter-Separatism? Defense Technical Information Center, 2003. http://dx.doi.org/10.21236/ada415744.
Full textChambliss, John G. An Assessment of the United States National Security Strategy for Combating Terrorism. Defense Technical Information Center, 2004. http://dx.doi.org/10.21236/ada423313.
Full textEssig, Christopher G. Terrorism: Criminal Act or Act of War Implications for National Security in the 21st Century. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada394661.
Full text