|
|
|
|
LEADER |
04082nam a22005535i 4500 |
001 |
24059 |
003 |
DE-He213 |
005 |
20151204163743.0 |
007 |
cr nn 008mamaa |
008 |
131108s2013 gw | s |||| 0|eng d |
020 |
# |
# |
|a 9783319028187
|9 978-3-319-02818-7
|
024 |
7 |
# |
|a 10.1007/978-3-319-02818-7
|2 doi
|
050 |
# |
4 |
|a QA76.9.D343
|
072 |
# |
7 |
|a UNF
|2 bicssc
|
072 |
# |
7 |
|a UYQE
|2 bicssc
|
072 |
# |
7 |
|a COM021030
|2 bisacsh
|
082 |
0 |
4 |
|a 006.312
|2 23
|
100 |
1 |
# |
|a Subrahmanian, V.S.
|e author.
|
245 |
1 |
0 |
|a Indian Mujahideen
|b Computational Analysis and Public Policy /
|c by V.S. Subrahmanian, Aaron Mannes, Animesh Roul, R.K. Raghavan.
|h [electronic resource] :
|
264 |
# |
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2013.
|
300 |
# |
# |
|a XVIII, 173 p. 22 illus.
|b online resource.
|
336 |
# |
# |
|a text
|b txt
|2 rdacontent
|
337 |
# |
# |
|a computer
|b c
|2 rdamedia
|
338 |
# |
# |
|a online resource
|b cr
|2 rdacarrier
|
347 |
# |
# |
|a text file
|b PDF
|2 rda
|
490 |
1 |
# |
|a Terrorism, Security, and Computation,
|x 2197-8778
|
505 |
0 |
# |
|a Introduction -- Indian Mujahideen (IM) -- Temporal Probabilistic Behavior Rules -- Targeting Public Sites -- Bombings -- Simultaneous and Timed Attacks -- Total Deaths in IM Attacks -- Computing Policy Options -- Suggested Counter-Terrorism Policies -- Building a National Counter-Terrorism Center -- Appendix A: Data Methodology -- Appendix B: List of All Terrorist Attacks Carried out by IM -- Appendix C: Temporal Probabilistic Rules Presented in This Book -- Appendix D: Instances of Improved Diplomatic Relations between India and Pakistan -- Appendix E: Instances of Indian Mujahideen Conferences -- Appendix F: Indian Mujahideen Claims of Responsibility for Attacks -- Appendix G: Instances of Indian Mujahideen Communications about its Terror Campaign.
|
520 |
# |
# |
|a Advance Praise for Indian Mujahideen: Computational Analysis and Public Policy ỚSThis book presents a highly innovative computational approach to analyzing the strategic behavior of terrorist groups and formulating counter-terrorism policies.℗ It would be very useful for international security analysts and policymakers.Ớ<U+00fd> Uzi Arad, National Security Advisor to the Prime Minister of Israel and Head, Israel National Security Council (2009-2011) ỚSAn important book on a complex security problem. Issues have been analysed in depth based on quality research. Insightful and well-balanced in describing the way forward.Ớ<U+00fd> Naresh Chandra, Indian Ambassador to the USA (1996-2001) and Cabinet Secretary (1990-1992). ỚSAn objective and clinical account of the origins, aims, extra-territorial links and modus-operandi,℗ of a growingly dangerous terrorist organization that challenges ℗ the federal, democratic, secular and pluralistic ethos of IndiaỚ"s polity. ℗ The authors have meticulously researched and analysed the multi-faceted challenges that the ỚSIndian MujahideenỚ<U+00fd> poses and realistically dwelt on the ways in which these challenges could be faced and overcome.Ớ<U+00fd> G. Parthasarathy, High Commissioner of India to Australia (1995-1998) and Pakistan (1998-2000). Foreword by the Hon. Louis J. Freeh.
|
650 |
# |
0 |
|a Computer science.
|
650 |
# |
0 |
|a Political science.
|
650 |
# |
0 |
|a Data mining.
|
650 |
# |
0 |
|a Public international law.
|
650 |
# |
0 |
|a Criminology.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Data Mining and Knowledge Discovery.
|
650 |
2 |
4 |
|a Political Science.
|
650 |
2 |
4 |
|a Criminology & Criminal Justice.
|
650 |
2 |
4 |
|a Public International Law.
|
700 |
1 |
# |
|a Mannes, Aaron.
|e author.
|
700 |
1 |
# |
|a Roul, Animesh.
|e author.
|
700 |
1 |
# |
|a Raghavan, R.K.
|e author.
|
710 |
2 |
# |
|a SpringerLink (Online service)
|
773 |
0 |
# |
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319028170
|
830 |
# |
0 |
|a Terrorism, Security, and Computation,
|x 2197-8778
|
856 |
4 |
0 |
|u https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-3-319-02818-7
|z View fulltext via EzAccess
|
912 |
# |
# |
|a ZDB-2-SCS
|
950 |
# |
# |
|a Computer Science (Springer-11645)
|