Computational Methods for Counterterrorism
Modern terrorist networks pose an unprecedented threat to international security. Their fluid and non-hierarchical structures, their religious and ideological motivations, and their predominantly non-territorial objectives all radically complicate the question of how to neutralize them. As governmen...
Corporate Author: | SpringerLink (Online service) |
---|---|
Other Authors: | Argamon, Shlomo. (Editor), Howard, Newton. (Editor) |
Format: | Electronic |
Language: | English |
Published: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2009.
|
Subjects: | |
Online Access: | https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-3-642-01141-2 |
Similar Items
-
Internet infrastructure : networking, web services, and cloud computing /
by: Fox, Richard, 1964-, et al.
Published: (2018) -
Information technology, systems research, and computational physics /
Published: (2020) -
The impact of service oriented architecture adoption on organizations /
by: Niknejad, Naghmeh,, et al.
Published: (2019) -
Communication systems principles using MATLAB /
by: Leis, John W.,
Published: (2018) -
Cybersecurity fundamentals a real-world perspective /
by: Thakur, Kutub.
Published: (2020)