Skip to main content
Ingia
Bookshare Kenya: Home
-A +A
  • Lugha
    • English
    • Swahili
Msaada

Matokeo ya Utafutaji

Search results: 22
  • How Do We Know What Information Sharing Is Really Worth?: Exploring Methodologies to Measure the Value of Information Sharing and Fusion Efforts

    How Do We Know What Information Sharing Is Really Worth?: Exploring Methodologies to Measure the Value of Information Sharing and Fusion Efforts

    by Brian A. Jackson

    How Do We Know What Information Sharing Is Really Worth?: Exporing Methodologies to Measure the Value of Information Sharing and Fusion Efforts (Research Reports) ... More

    Language: ENG
    Hakimiliki: 2014
  • Understanding the Role of Deterrence in Counterterrorism Security

    Understanding the Role of Deterrence in Counterterrorism Security

    by Brian A. Jackson • Andrew R. Morral

    Deterrence--a central feature of counterterrorism security systems and a major factor in the cost-effectiveness of many security programs--is not well understood or measured. This paper offers a framework for understanding how security systems may deter or displace attacks and how to measure the rel... More

    Language: ENG
    Hakimiliki: 2009
  • Sharing the Dragon's Teeth: Terrorist Groups and the Exchange of New Technologies

    Sharing the Dragon's Teeth: Terrorist Groups and the Exchange of New Technologies

    by Peter Chalk • Sara A. Daly • Kim Cragin • Brian A. Jackson

    Case studies of 11 terrorist groups in Mindanao, the West Bank and Gaza Strip, and southwest Colombia show how these groups have exchanged technologies and knowledge in an effort to innovate (i.e., improve their operational capabilities). The analysis provides national security policymakers with ins... More

    Language: ENG
    Hakimiliki: 2007
  • Challenges and Choices for Crime-Fighting Technology  Federal Support of State and Local Law Enforcement

    Challenges and Choices for Crime-Fighting Technology Federal Support of State and Local Law Enforcement

    by Lois M. Davis • Brian A. Jackson • William Schwabe

    Under the American federal system, most law is cast as state statutes and local ordinances; accordingly, most law enforcement is the responsibility of state and local agencies. Federal law and federal law enforcement come into play only where there is rationale for it, consistent with the Constituti... More

    Language: ENG
    Hakimiliki: 2001
  • Stealing the Sword: Limiting Terrorist Use of Advanced Conventional Weapons

    Stealing the Sword: Limiting Terrorist Use of Advanced Conventional Weapons

    by David R. Frelinger • Brian A. Jackson • James Bonomo • Giacomo Bergamo

    Examines how terrorists make technology choices and how the United States can discourage terrorists' use of advanced conventional weapons. Concludes that the United States should urgently start discussions with key producer nations and also decide on an architecture needed to impose technical contro... More

    Language: ENG
    Hakimiliki: 2007
  • Evaluating the Reliability of Emergency Response Systems for Large-Scale Incident Operations

    Evaluating the Reliability of Emergency Response Systems for Large-Scale Incident Operations

    by Henry H. Willis • Brian A. Jackson • Kay Sullivan Faith

    The ability to measure emergency preparedness is critical for policy analysis in homeland security. Yet it remains difficult to know how prepared a response system is to deal with large-scale incidents, whether it be a natural disaster, terrorist attack, or industrial or transportation accident. Thi... More

    Language: ENG
    Hakimiliki: 2010
  • Considering the Creation of a Domestic Intelligence Agency in the United States

    Considering the Creation of a Domestic Intelligence Agency in the United States

    by Cheryl Y. Marcum • Brian A. Jackson • Albert A. Robbert • Andrew Riddile

    With terrorism still prominent on the U.S. agenda, whether the country's prevention efforts match the threat the United States faces continues to be central in policy debate. One element of this debate is questioning whether the United States should create a dedicated domestic intelligence agency. C... More

    Language: ENG
    Hakimiliki: 2009
  • Protecting Emergency Responders

    Protecting Emergency Responders

    by Tom Latourrette • Brian A. Jackson • James T. Bartis • Irene T. Brahmakulam • D. J. Peterson

    In December 2001, a conference held in New York City brought together individuals with firsthand knowledge of emergency responses to terrorist attacks to discuss ways to improve the health and safety of emergency workers who respond to large-scale disasters. The meeting considered the responses to t... More

    Language: ENG
    Hakimiliki: 2002
  • Protecting Emergency Responders Volume 2

    Protecting Emergency Responders Volume 2

    by Tom Latourrette • Brian A. Jackson • James T. Bartis • D. J. Peterson • Ari Houser

    Firefighters, law enforcement officers, and emergency medical service responders play a critical role in protecting people and property in the event of fires, medical emergencies, terrorist acts, and numerous other emergencies. The authors examine the hazards that responders face and the personal p... More

    Language: ENG
    Hakimiliki: 2003
  • Emerging Threats and Security Planning

    Emerging Threats and Security Planning

    by Henry H. Willis • David R. Frelinger • Brian A. Jackson • Charles J. Bushman

    Concerns about how terrorists might attack in the future are central to the design of security efforts to protect both individual targets and the nation overall. This paper explores an approach for assessing novel or emerging threats and prioritizing which merit specific security attention and which... More

    Language: ENG
    Hakimiliki: 2009
  • Evaluating Novel Threats to the Homeland

    Evaluating Novel Threats to the Homeland

    by David R. Frelinger • Michael J. Lostumbo • Robert W. Button • Brian A. Jackson

    Changes in technology and adversary behavior will invariably produce new threats that must be assessed by defense and homeland security planners. An example of such a novel threat is the use of cruise missiles or unmanned aerial vehicles (UAVs) by terrorist groups. Individual threats cannot be asse... More

    Language: ENG
    Hakimiliki: 2008
  • Addressing Emerging Trends to Support the Future of Criminal Justice: Findings of the Criminal Justice Technology Forecasting Group

    Addressing Emerging Trends to Support the Future of Criminal Justice: Findings of the Criminal Justice Technology Forecasting Group

    by Richard Silberglitt • Brian A. Jackson • John S. Hollywood • Dulani Woods • Andrew Lauland

    The Criminal Justice Technology Forecasting Group (CJTFG) deliberated on the effects that major technology and social trends could have on criminal justice in the next two to five years and identified potential responses. This report captures the results of the group’s meetings and initiatives, pres... More

    Language: ENG
    Hakimiliki: 2018
  • Aptitude for Destruction, Volume 2

    Aptitude for Destruction, Volume 2

    by Peter Chalk • Kim Cragin • Brian A. Jackson • John C. Baker • John V. Parachini

    Better ways are needed to understand how terrorist groups increase their effectiveness and become more dangerous. Learning is the link between what a group wants to do and its ability to actually do it; therefore, a better understanding of group learning might contribute to the design of better meas... More

    Language: ENG
    Hakimiliki: 2005
  • Breaching the Fortress Wall: Understanding Terrorist Efforts to Overcome Defensive Technologies

    Breaching the Fortress Wall: Understanding Terrorist Efforts to Overcome Defensive Technologies

    by Peter Chalk • Kim Cragin • Brian A. Jackson • John V. Parachini • Bruce Newsome • R. Kim Cragin

    Technology systems play a key role within a larger, integrated strategy to target groups' efforts and protect the public from the threat of terrorist violence. This study draws on relevant data from the history of a variety of terrorist conflicts to understand terrorists' counter-technology efforts.... More

    Language: ENG
    Hakimiliki: 2007
  • Securing America's Passenger-Rail Systems

    Securing America's Passenger-Rail Systems

    by Brian A. Jackson • K. Jack Riley • Jeremy M. Wilson • Paul Steinberg • Mel Eisman

    U.S. communities depend on reliable, safe, and secure rail systems. Each weekday, more than 12 million passengers take to U.S. railways. This book explains a framework for security planners and policymakers to guide cost-effective rail-security planning, specifically for the risk of terrorism. Risk ... More

    Language: ENG
    Hakimiliki: 2007
  • Fostering Innovation in Community and Institutional Corrections: Identifying High-Priority Technology and Other Needs for the U.S. Corrections Sector

    Fostering Innovation in Community and Institutional Corrections: Identifying High-Priority Technology and Other Needs for the U.S. Corrections Sector

    by Richard Silberglitt • Brian A. Jackson • Brian G. Chow • John S. Hollywood • Dulani Woods • Joe Russo • George B. Drake • John S. Shaffer • Mikhail Zaydman

    Given the challenges posed to the U. S. corrections sector, such as tightened budgets and increasingly complex populations under its charge, it is valuable to identify opportunities where changes in tools, practices, or approaches could improve performance. In this report, RAND researchers, with t... More

    Language: ENG
    Hakimiliki: 2015
  • Mapping White Identity Terrorism and Racially or Ethnically Motivated Violent Extremism: A Social Network Analysis of Online Activity

    Mapping White Identity Terrorism and Racially or Ethnically Motivated Violent Extremism: A Social Network Analysis of Online Activity

    by Heather J. Williams • Luke J. Matthews • Pauline Moore • Matthew A. DeNardo • James V. Marrone • Brian A. Jackson • William Marcellino • Todd C. Helmus

    The authors reviewed literature on White identity terrorism and racially or ethnically motivated violent extremism (REMVE) and analyzed social media data from six platforms that host extremist content. They developed a network map that evaluates REMVE network construction, connectivity, geographic l... More

    Language: ENG
    Hakimiliki: 2022
  • The Psychology of Assessment Centers

    The Psychology of Assessment Centers

    by Charles E. Lance • Brian J. Hoffman • Duncan J. R. Jackson

    Research on the reliability and validity of assessment centers (ACs) has been ongoing for at least 50 years and continues to this day. The assessment center method is a technique or process that is used to assess individual performance and potential. One of the most heavily researched topics over th... More

    Language: ENG
    Hakimiliki: 2012
  • Reconstruction and Empire: The Legacies of Abolition and Union Victory for an Imperial Age (Reconstructing America)

    Reconstruction and Empire: The Legacies of Abolition and Union Victory for an Imperial Age (Reconstructing America)

    by Mark Elliott • Rebecca Edwards • Lawrence B. Glickman • David V. Holtby • David Prior • Adrian Brettle • Christina C. Davidson • Andre Fleche • Gregg French • Reilly Ben Hatch • Justin F. Jackson • Dj Polite • Brian Shott

    This volume examines the historical connections between the United States’ Reconstruction and the country’s emergence as a geopolitical power a few decades later. It shows how the processes at work during the postbellum decade variously foreshadowed, inhibited, and conditioned the development of the... More

    Language: ENG
    Hakimiliki: 2022
  • The Razor's Edge

    The Razor's Edge

    by Steve Perry • Sharon Lee • Steve Miller • Kay Kenyon • William C. Dietz • Walter H. Hunt • L. E. Modesitt • Joshua Palmatier • Gerald Brandt • Seanan McGuire • D. B. Jackson • Troy Carrol Bucher • Blake Jessop • Sharon P. Goza • Christopher Allenby • Chris Kennedy • Alex Gideon • Brian Hugenbruch • Y. M. Pang

    One man’s insurgent is another man’s freedom fighter… From The Moon is a Harsh Mistress to The Hunger Games, everyone enjoys a good rebellion. There is something compelling about a group (or individual) who throws caution to the wind and rises up in armed defiance against oppression, tyranny, religi... More

    Language: ENG
    Hakimiliki: 2018
  • Next Steps: New Directions for/in Writing about Writing

    Next Steps: New Directions for/in Writing about Writing

    by Nancy Wilson • Rebecca Jackson • Elizabeth Wardle • Linda Adler-Kassner • Christian Smith • Christina Grant • Elizabeth Kleinfeld • Jennifer DeWinter • Rebecca Robinson • Emma Gaier • Megan Wallace • Lisa Tremain • Hiroki Sugimoto • Joy Arbor • Valerie Vera • Gwen Hart • Mysti Rudd • Kristen Di Gennaro • Cat Mahaffey • Shawn Casey • Andrew Ogilvie • Olga Aksakalova • Dominique Zino • Andrew Lucchesi • Gabriel Cutrufello • Michael Michaud • Sarah Read • Francis Johnson • Samuel Stinson • Rebecca Nowacek • Kimberly Hoover • Elle Limesand • Maggie Hammond • Max Wellman • Matthew Bryan • Kevin Roozen • Nicole Stack • Christy I. Wenger • Gabrielle Frick • Patrick Siebel • Katie Jo LaRiviere

    Next Steps: New Directions for/in Writing about Writing is the first collection of teacher and student voices on a writing pedagogy that puts expert knowledge at the center of the writing classroom. More than forty contributors report on implementations of writing-about-writing pedagogies from the b... More

    Language: ENG
    Hakimiliki: 2019
  • Transgenic Insects: Techniques and Applications (CABI Biotechnology Series #3)

    Transgenic Insects: Techniques and Applications (CABI Biotechnology Series #3)

    by Brian L. Weiss • Arvind Sharma • Andrew Hammond • Nicole Klein • John Mumford • Ricardo Pereira • Lucy Carter • Claudia Emerson • Guy Smagghe • Ravi V. Durvasula • Tony Nolan • Serap Aksoy • Aaron Roberts • Hassan M. Ahmed • Omar S. Akbar • Yehonatan Alcalay • Luke Alphey • Yael Arien • Rotem Daniel Avraham • Camilla Beech • Nicholas J. Bongio • Vanessa Bottino-Rojas • L. Roman Carrasco • Jackson Champer • Isabelle Coche • Carolina Concha • Rocco D’Amato • Brinda Dass • Jason A. Delborne • Ellen M. Dotson • Matthew P. Edgington • Guido Favia • Adam P. Forshaw • Alexander W.E. Franz • Marisa L. Guido • Monika Gulia-Nuss • Daniella An Haber • Alfred M. Handler • Keith R. Hayes • Ivy Hurwitz • Anthony A. James • Thomas P. Kelly • Ana Kormos • Lee Benjamin Lamdan • David J. Lampe • Rosemary S. Lees • Maria Vittoria Mancini • Aditi Mankad • Andrew Nuss • David A. O’Brochta • Riccardo Papa • Philippos Aris Papathanos • Michael Pham • Megan Quinlan • Robyn Raban • Jason L. Rasgon • Yasha Rohwer • Nathan Rose • Marc F. Schetelig • Kristof De Schutter • Hideki Sezutsu • Gregory S. Simmons • Toshiki Tamura • Delphine Thizy • Lea Pare Toe • Ernst A. Wimmer • Liu Yang

    Technology for modifying the genotypes and phenotypes of insects and other arthropods has steadily progressed with the development of more precise and powerful methods, most prominently transgenic modification. For many insect pests, there is now almost unlimited ability to modify phenotypes to bene... More

    Language: ENG
    Hakimiliki: 2022
Takasa Utafutaji
Show More Results

Takasa Utafutaji

Enter a 10 or 13 digit numerical ISBN code
Kategoria
Ondoa

Footer

  • Kuhusu
  • Partners
  • Sheria
  • Zana za Ulemavu
  • Faragha
  • Contact
  • Blogu
Bookshare® na Benetech® ni alama za biashara zilizosajiliwa na Beneficent Technology, Inc. Beneficent Technology , Inc. Tovuti hii ni © Hakimiliki 2002-2023, Beneficent Technology, Inc.