My Account Log in

2 options

Technological dimensions of defence against terrorism / edited by U. Feyyaz Aydoğdu.

Ebook Central Academic Complete Available online

View online

Ebook Central College Complete Available online

View online
Format:
Book
Conference/Event
Author/Creator:
Technological Dimensions of Defence Against Terrorism (Workshop), Corporate Author.
Contributor:
Aydoğdu, U. Feyyaz.
Conference Name:
Technological Dimensions of Defence Against Terrorism (Workshop) (2011 : Ankara, Turkey)
Technological Dimensions of Defence Against Terrorism (Workshop)
Series:
NATO science for peace and security series. Human and societal dynamics ; E, v. 115.
NATO Science for Peace and Security Series, E: Human and societal dynamics, 1879-8268 ; Volume 115
Language:
English
Subjects (All):
Terrorism--Prevention--Technological innovations--Congresses.
Terrorism.
Physical Description:
1 online resource (152 p.)
Edition:
1st ed.
Place of Publication:
Amsterdam, Netherlands : IOS Press, 2013.
Language Note:
English
Summary:
The technological developments of recent years have influenced both the threat of terrorist attacks and the defence against them, and continue to be the focus of attention. Terrorist groups are not slow to exploit new technological developments and adapt them to their own ends, and the forces of counterterrorism cannot afford to fall behind in their understanding of potential threats. This book presents the proceedings of the NATO Centre of Excellence - Defence against Terrorism (COE-DAT) Advanced Research Workshop, ""Technological Dimensions of Defence against Terrorism"", held in Ankara, Tur
Contents:
TECHNOLOGICAL DIMENSIONS OF DEFENCE AGAINST TERRORISM; Preface; Contents; A Brief Theory of Terrorism and Technology Revisited; Introduction; 1.Description of Terrorism; 2.Technology and Terrorism; 2.1 Transportation; 2.2 Communications; 2.3 Weapons; 2.4 Potential New Weapons; Conclusion; Bibliography; Current Technological Advances and their Impact on Terrorism and Counterterrorism Efforts; Introduction; 1. The Relationship between Technology and Terrorism; 2. Convergence of Technologies; 3. RTO and its Activities in DAT; 1.1 Applied Vehicle Technology (AVT) Panel
1.2 Human Factors and Medicine (HFM) Panel1.3 Information Systems and Technology (IST) Panel; 1.4 NATO Modeling & Simulation Group (NMSG); 1.5 System Analysis and Studies (SAS) Panel; 1.6 Systems Concepts and Integration (SCI) Panel; 1.7 Sensors and Electronics Technology (SET) Panel; Conclusion; Bibliography; The Role of the Commercial World in Defence against Terrorism; Introduction; 1. Technology, Organisation and People; 2. Defence Companies and their Smaller Competitors; 3. Defence against Terrorism; 4. NATO Actions; Conclusion
Weaponization and Delivery Systems that Terrorists Use for Biological and Chemical AgentsIntroduction; 1. Chemical Terrorism; 1.1. Chemical Warfare History; 1.2. Some Possible Chemical Agents that Could Be Used by Terrorists; 1.3. Aerosol Dynamics; 1.4. History and Weaponization of Chemical Weapons; 1.5. Case Study Analysis of Chemical Terrorism; 2. Biological Terrorism; 2.1. Biological Warfare History; 2.2. Some Possible Biological Agents that Could be Used by Terrorists; 2.3. Production and Weaponization of Biological Weapons; 2.4. Case Study Analysis of Biological Terrorism
3. Analysis of Chemical and Biological Terrorism Extrapolate to the Future; Conclusion; Bibliography; Appendix A; Measures to Counter the Threat of WMD Terrorism; Introduction; 1. The Nature of the Threat; 1.1 WMD Threats; 1.2 Employment; 2. Countering the Threat; 3. The Role of NGOs and the Private Sector; Conclusion; Bibliography; Transportation Technology and Its Effect on the Speed, Distance and Magnitude of Terrorist Attacks; Introduction; 1. The Historical Background; 2. Globalization and Modern Terrorism; 3. Intermodal Passenger Systems; 4. Intermodal Freight Systems; Conclusion
BibliographyTerrorist Threats to Energy Critical Infrastructure Technology and Protection Systems; Introduction; 1. Energy Security and Critical Energy Infrastructure; 2. Critical Energy Infrastructure and Terrorism; Conclusion; Bibliography; Terrorist Use of Communication Technology and Social Networks; Introduction; 1. Recruitment; 2. Radicalization; 3. Training; 4. Communication: Internal and External; 5. Tactical Uses; 6. Command and Control; 7. Fundraising; 8. Cyberattacks; Conclusion; Bibliography; Use of Cyberspace and Technology by Terrorists; Introduction; 1. What is Cyberspace?
2. How Terrorists Exploit Cyberspace
Notes:
Description based upon print version of record.
Includes bibliographical references and indexes.
Description based on print version record.
ISBN:
1-61499-317-3
OCLC:
867820508

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account