Choice Outstanding Academic Title 2014This volume examines "e;jihadi"e; content on the Internet by drawing on both Arabic and English primary source materials.
Cinematic Terror takes a uniquely long view of filmmakers' depiction of terrorism, examining how cinema has been a site of intense conflict between paramilitaries, state authorities and censors for well over a century.
Since 9/11, the dominant view is that we have entered an era of 'new conflict' in which technology has empowered non-state actors who now pose unprecedented and unmanageable threats to U.
The work examines the rise of the movements against globalization, modernization, and Western dominance that followed the collapse of the bipolar world and the end of the Cold War and that culminated with today's global jihadist movements.
In this collection, senior experts explore all aspects of extreme right wing political violence, from the nature of the threat, processes of engagement, and ideology to the lessons that can be drawn from exiting such engagement.
The book examines Bernard Brodie's strategic and philosophical response to the nuclear age, embedding his work within the classical theories of Carl von Clausewitz.
In this groundbreaking work, leading scholars and experts set out to explore the utility of the concept of affordance in the study and understanding of terrorism and political violence.
The work examines the rise of the movements against globalization, modernization, and Western dominance that followed the collapse of the bipolar world and the end of the Cold War and that culminated with today's global jihadist movements.
Choice Outstanding Academic Title 2014This volume examines "e;jihadi"e; content on the Internet by drawing on both Arabic and English primary source materials.
In this collection, senior experts explore all aspects of extreme right wing political violence, from the nature of the threat, processes of engagement, and ideology to the lessons that can be drawn from exiting such engagement.
This multivolume encyclopedia surveys America's long and troubled history of political violence from the colonial era to the present, with a particular emphasis on factors driving political violence and intimidation in the United States in the 21st century.
This cohesive set of case studies collects scholarly research, policy evaluation, and field experience to explain how terrorist groups have developed into criminal enterprises.
Written for general readers and professionals alike, this succinct but comprehensive work examines the hybrid nature of the two violent extremist movements threatening the United States: Islamist extremism and white nationalism.
This illuminating work offers readers a comprehensive overview of ISIS, with more than 100 in-depth articles on a variety of topics related to the notorious terrorist group, and more than a dozen key primary source documents.
This book looks into four areas of our world's international security crisis: the growing threat of America's homegrown jihadists, the continuing rise of terrorism, the causes of gross violations of human rights, and the pervasiveness of civil war.
The Definitive Handbook on Terrorist Threats to Commercial Airline and Airport SecurityConsidered the definitive handbook on the terrorist threat to commercial airline and airport security, USAF Lieutenant Colonel Kathleen Sweet's seminal resource is now updated to include an analysis of modern day risks.
Global criminology is an emerging field covering international and transnational crimes that have not traditionally been the focus of mainstream criminology or criminal justice.
While geography is not the only factor to shape human behavior, its influence on terrorists' motivations, behaviors, options, and activities is a primary consideration in understanding terrorism.
Effective Surveillance for Homeland Security: Balancing Technology and Social Issues provides a comprehensive survey of state-of-the-art methods and tools for the surveillance and protection of citizens and critical infrastructures against natural and deliberate threats.
Traditionally, resources on terrorism and counterterrorism tend to focus on the social, behavioral, and legal aspects of the subject, with minimal emphasis on the scientific and technological aspects.
Drawn from case examples of incidents from around the world, Targeted Violence: A Statistical and Tactical Analysis of Assassinations, Contract Killings, and Kidnappings is the most complete resource of information on the attack methodologies, tactics used, and groups responsible for targeted killings and kidnappings.
As the twelfth most populous nation, the Philippines' diverse religious and ethnic population makes it an ideal example of the changing tenet of what is deemed national security-post 9/11.
Because terrorists are made, not born, it is critically important to world peace that detainees and inmates influenced by violent ideology are deradicalized and rehabilitated back into society.
Tracking funding is a critical part of the fight against terrorism and as the threat has escalated, so has the development of financial intelligence units (FIUs) designed to investigate suspicious transactions.
The work of crime scene investigators (CSIs) is made more complicated when the scene is contaminated by either chemical, biological, radiological, nuclear, explosives (CBRNE) or toxic industrial chemicals (TICs).
The Psychology of Terrorists examines the personality profile of the individual and categorizes the psychology of terrorists into four distinct profiles which are outlined and analyzed in detail.
The analytical power of ion mobility spectrometry-mass spectrometry (IMS-MS) instruments is poised to advance this technology from research to analytical laboratories.
As the twelfth most populous nation, the Philippines' diverse religious and ethnic population makes it an ideal example of the changing tenet of what is deemed national security-post 9/11.
Written by a Certified Protection Professional (CPP), Certified Fraud Examiner (CFE), and FBI-recognized subject matter expert, this text details the recommended protocol for protecting people and assets in hostile global settings.
As industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services to attack.
A New York Times, Wall Street Journal, and Washington Post best seller, now available with a new chapter on events in Afghanistan plus an exclusive onlineaccesscode for three downloadable episodes of War Stories!