Terrorism and Counterterrorism : : A Comprehensive Introduction to Actors and Actions / / Henry Prunckun, Troy Whitford.

What is terrorism? How do terrorists operate—what are their means, targets, and motivations? How can governments prevent terrorist attacks from happening? Henry Prunckun and Troy Whitford address these questions in their systematic, comprehensive exploration of terrorism and counterterrorism. Notabl...

Full description

Saved in:
Bibliographic Details
Superior document:Title is part of eBook package: De Gruyter Lynne Rienner Press Complete eBook-Package 2019
VerfasserIn:
MitwirkendeR:
Place / Publishing House:Boulder : : Lynne Rienner Publishers, , [2022]
©2019
Year of Publication:2022
Language:English
Online Access:
Physical Description:1 online resource (269 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 9781955055314
ctrlnum (DE-B1597)623822
collection bib_alma
record_format marc
spelling Prunckun, Henry, author. aut http://id.loc.gov/vocabulary/relators/aut
Terrorism and Counterterrorism : A Comprehensive Introduction to Actors and Actions / Henry Prunckun, Troy Whitford.
Boulder : Lynne Rienner Publishers, [2022]
©2019
1 online resource (269 p.)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
text file PDF rda
Frontmatter -- Contents -- Tables and Figures -- Foreword -- Acknowledgments -- 1 Introducing Terrorism and Counterterrorism -- Part 1 Terrorism -- 2 Contemporary Forms of Terrorism -- 3 Radicalization -- 4 Targets -- 5 Methods and Weapons -- 6 Financing -- 7 Media Coverage -- 8 Victims of Terrorism -- Part 2 Counterterrorism -- 9 Counterterrorism and the Rule of Law -- 10 Law Enforcement and the Military -- 11 Intelligence Collection and Analysis -- 12 Protection of Critical Infrastructure -- 13 Deradicalization -- 14 Global Approaches to Counterterrorism -- 15 Can the War on Terror Be Won? -- Bibliography -- Index -- About the Book
restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star
What is terrorism? How do terrorists operate—what are their means, targets, and motivations? How can governments prevent terrorist attacks from happening? Henry Prunckun and Troy Whitford address these questions in their systematic, comprehensive exploration of terrorism and counterterrorism. Notably, this authoritative text: Explains complex issues in an objective, accessible way; traces the phenomenon of terrorism through history; examines law enforcement, as well as intelligence and military operations; features case studies from around the world; and includes learning aids for students. Designed to appeal to both students and instructors, the text enables readers to deepen their understanding of terrorism today and learn what is being done to combat it.
Mode of access: Internet via World Wide Web.
In English.
Description based on online resource; title from PDF title page (publisher's Web site, viewed 29. Jun 2022)
POLITICAL SCIENCE / World / Middle Eastern. bisacsh
Jenkins, Brian Michael, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Whitford, Troy, author. aut http://id.loc.gov/vocabulary/relators/aut
Title is part of eBook package: De Gruyter Lynne Rienner Press Complete eBook-Package 2019 9783110783544
https://doi.org/10.1515/9781955055314
https://www.degruyter.com/isbn/9781955055314
Cover https://www.degruyter.com/document/cover/isbn/9781955055314/original
language English
format eBook
author Prunckun, Henry,
Prunckun, Henry,
Whitford, Troy,
spellingShingle Prunckun, Henry,
Prunckun, Henry,
Whitford, Troy,
Terrorism and Counterterrorism : A Comprehensive Introduction to Actors and Actions /
Frontmatter --
Contents --
Tables and Figures --
Foreword --
Acknowledgments --
1 Introducing Terrorism and Counterterrorism --
Part 1 Terrorism --
2 Contemporary Forms of Terrorism --
3 Radicalization --
4 Targets --
5 Methods and Weapons --
6 Financing --
7 Media Coverage --
8 Victims of Terrorism --
Part 2 Counterterrorism --
9 Counterterrorism and the Rule of Law --
10 Law Enforcement and the Military --
11 Intelligence Collection and Analysis --
12 Protection of Critical Infrastructure --
13 Deradicalization --
14 Global Approaches to Counterterrorism --
15 Can the War on Terror Be Won? --
Bibliography --
Index --
About the Book
author_facet Prunckun, Henry,
Prunckun, Henry,
Whitford, Troy,
Jenkins, Brian Michael,
Jenkins, Brian Michael,
Whitford, Troy,
Whitford, Troy,
author_variant h p hp
h p hp
t w tw
author_role VerfasserIn
VerfasserIn
VerfasserIn
author2 Jenkins, Brian Michael,
Jenkins, Brian Michael,
Whitford, Troy,
Whitford, Troy,
author2_variant b m j bm bmj
b m j bm bmj
t w tw
author2_role MitwirkendeR
MitwirkendeR
VerfasserIn
VerfasserIn
author_sort Prunckun, Henry,
title Terrorism and Counterterrorism : A Comprehensive Introduction to Actors and Actions /
title_sub A Comprehensive Introduction to Actors and Actions /
title_full Terrorism and Counterterrorism : A Comprehensive Introduction to Actors and Actions / Henry Prunckun, Troy Whitford.
title_fullStr Terrorism and Counterterrorism : A Comprehensive Introduction to Actors and Actions / Henry Prunckun, Troy Whitford.
title_full_unstemmed Terrorism and Counterterrorism : A Comprehensive Introduction to Actors and Actions / Henry Prunckun, Troy Whitford.
title_auth Terrorism and Counterterrorism : A Comprehensive Introduction to Actors and Actions /
title_alt Frontmatter --
Contents --
Tables and Figures --
Foreword --
Acknowledgments --
1 Introducing Terrorism and Counterterrorism --
Part 1 Terrorism --
2 Contemporary Forms of Terrorism --
3 Radicalization --
4 Targets --
5 Methods and Weapons --
6 Financing --
7 Media Coverage --
8 Victims of Terrorism --
Part 2 Counterterrorism --
9 Counterterrorism and the Rule of Law --
10 Law Enforcement and the Military --
11 Intelligence Collection and Analysis --
12 Protection of Critical Infrastructure --
13 Deradicalization --
14 Global Approaches to Counterterrorism --
15 Can the War on Terror Be Won? --
Bibliography --
Index --
About the Book
title_new Terrorism and Counterterrorism :
title_sort terrorism and counterterrorism : a comprehensive introduction to actors and actions /
publisher Lynne Rienner Publishers,
publishDate 2022
physical 1 online resource (269 p.)
contents Frontmatter --
Contents --
Tables and Figures --
Foreword --
Acknowledgments --
1 Introducing Terrorism and Counterterrorism --
Part 1 Terrorism --
2 Contemporary Forms of Terrorism --
3 Radicalization --
4 Targets --
5 Methods and Weapons --
6 Financing --
7 Media Coverage --
8 Victims of Terrorism --
Part 2 Counterterrorism --
9 Counterterrorism and the Rule of Law --
10 Law Enforcement and the Military --
11 Intelligence Collection and Analysis --
12 Protection of Critical Infrastructure --
13 Deradicalization --
14 Global Approaches to Counterterrorism --
15 Can the War on Terror Be Won? --
Bibliography --
Index --
About the Book
isbn 9781955055314
9783110783544
url https://doi.org/10.1515/9781955055314
https://www.degruyter.com/isbn/9781955055314
https://www.degruyter.com/document/cover/isbn/9781955055314/original
illustrated Not Illustrated
doi_str_mv 10.1515/9781955055314
work_keys_str_mv AT prunckunhenry terrorismandcounterterrorismacomprehensiveintroductiontoactorsandactions
AT jenkinsbrianmichael terrorismandcounterterrorismacomprehensiveintroductiontoactorsandactions
AT whitfordtroy terrorismandcounterterrorismacomprehensiveintroductiontoactorsandactions
status_str n
ids_txt_mv (DE-B1597)623822
carrierType_str_mv cr
hierarchy_parent_title Title is part of eBook package: De Gruyter Lynne Rienner Press Complete eBook-Package 2019
is_hierarchy_title Terrorism and Counterterrorism : A Comprehensive Introduction to Actors and Actions /
container_title Title is part of eBook package: De Gruyter Lynne Rienner Press Complete eBook-Package 2019
author2_original_writing_str_mv noLinkedField
noLinkedField
noLinkedField
noLinkedField
_version_ 1770177326173126656
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03850nam a22006255i 4500</leader><controlfield tag="001">9781955055314</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20220629043637.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">220629t20222019cou fo d z eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781955055314</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1515/9781955055314</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)623822</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">cou</subfield><subfield code="c">US-CO</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL059000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Prunckun, Henry, </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Terrorism and Counterterrorism :</subfield><subfield code="b">A Comprehensive Introduction to Actors and Actions /</subfield><subfield code="c">Henry Prunckun, Troy Whitford.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boulder : </subfield><subfield code="b">Lynne Rienner Publishers, </subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (269 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">Tables and Figures -- </subfield><subfield code="t">Foreword -- </subfield><subfield code="t">Acknowledgments -- </subfield><subfield code="t">1 Introducing Terrorism and Counterterrorism -- </subfield><subfield code="t">Part 1 Terrorism -- </subfield><subfield code="t">2 Contemporary Forms of Terrorism -- </subfield><subfield code="t">3 Radicalization -- </subfield><subfield code="t">4 Targets -- </subfield><subfield code="t">5 Methods and Weapons -- </subfield><subfield code="t">6 Financing -- </subfield><subfield code="t">7 Media Coverage -- </subfield><subfield code="t">8 Victims of Terrorism -- </subfield><subfield code="t">Part 2 Counterterrorism -- </subfield><subfield code="t">9 Counterterrorism and the Rule of Law -- </subfield><subfield code="t">10 Law Enforcement and the Military -- </subfield><subfield code="t">11 Intelligence Collection and Analysis -- </subfield><subfield code="t">12 Protection of Critical Infrastructure -- </subfield><subfield code="t">13 Deradicalization -- </subfield><subfield code="t">14 Global Approaches to Counterterrorism -- </subfield><subfield code="t">15 Can the War on Terror Be Won? -- </subfield><subfield code="t">Bibliography -- </subfield><subfield code="t">Index -- </subfield><subfield code="t">About the Book</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">What is terrorism? How do terrorists operate—what are their means, targets, and motivations? How can governments prevent terrorist attacks from happening? Henry Prunckun and Troy Whitford address these questions in their systematic, comprehensive exploration of terrorism and counterterrorism. Notably, this authoritative text: Explains complex issues in an objective, accessible way; traces the phenomenon of terrorism through history; examines law enforcement, as well as intelligence and military operations; features case studies from around the world; and includes learning aids for students. Designed to appeal to both students and instructors, the text enables readers to deepen their understanding of terrorism today and learn what is being done to combat it.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 29. Jun 2022)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / World / Middle Eastern.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jenkins, Brian Michael, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Whitford, Troy, </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">Lynne Rienner Press Complete eBook-Package 2019</subfield><subfield code="z">9783110783544</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1515/9781955055314</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9781955055314</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/document/cover/isbn/9781955055314/original</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-078354-4 Lynne Rienner Press Complete eBook-Package 2019</subfield><subfield code="b">2019</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_BACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_PPALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_SSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA11SSHE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA13ENGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA17SSHEE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA5EBK</subfield></datafield></record></collection>