Terrorist organizations use many technologies as they plan and stage attacks. This book explores the purpose and manner of the use of communication and computer technologies, their net effect, and security forces' possible responses. The authors conclude that, instead of developing direct counters to these technologies, exploiting their use and the information they manage to enable more direct security force operations is a more promising option.
"synopsis" may belong to another edition of this title.
Terrorists use network technologies as they plan and stage attacks. This book explores the purpose and manner of the use of these technologies, their net effect, and security forces' possible responses.
Terrorists use network technologies as they plan and stage attacks. This book explores the purpose and manner of the use of these technologies, their net effect, and security forces' possible responses.
"About this title" may belong to another edition of this title.
Seller: Revaluation Books, Exeter, United Kingdom
Paperback. Condition: Brand New. 1st edition. 100 pages. 10.75x8.25x0.50 inches. In Stock. Seller Inventory # zk083304141X
Quantity: 1 available