Search results

RSS feed for this result

14,803 results

Book
68 p. ; 20 cm.
Law Library (Crown)
Book
4 p. ; 24 cm.
Law Library (Crown)
Book
4 p. ; 24 cm.
Green Library
Book
ix, 194 p. ; 23 cm.
SAL1&2 (on-campus shelving)
Book
5 volumes : illustrations ; 23 cm
  • v. 22. Documents 1-79
  • v. 23. Documents 80-100
  • v. 24. Documents 101--118
  • v. 25. Documents 119
  • 143
  • v. 26. Documents 144 --152.
Law Library (Crown)
Book
5 volumes : illustrations ; 23 cm
  • v. 17. Documents 1-29
  • v. 18. Documents 30-93
  • v. 19. Documents 94-129 pt. 1
  • v. 20. Documents 129 pt. 2
  • 132 pt. 1
  • v. 21. Documents 132 pt. 2--145.
Law Library (Crown)
Book
11 volumes : illustrations ; 23 cm
  • v. 6. Documents 1-33 pt. 1
  • v. 7. Documents 33 pt. 2-39
  • v. 8. Documents 40-49
  • v. 9. Documents 50
  • v. 10. Documents 51-56
  • v. 11. Documents 57-59 pt. 1
  • v. 12. Document 59 pt. 2
  • v. 13. Documents 60-86
  • v. 14. Documents 87-104
  • v. 15. Documents 105-115
  • v. 16. Documents 116-148.
Law Library (Crown)
Book
5 v. ; 23 cm.
  • v. 1. Documents 1-15
  • v. 2. Documents 16-21
  • v. 3. Documents 22-28
  • v. 4. Documents 29-80
  • v. 5. Documents 81-106.
Law Library (Crown)
Book
128 p. ; 22 cm.
The USA Patriot Act passed in the wake of the September 11 terrorist attacks. It flows from a consultation draft circulated by the Department of Justice, to which Congress made substantial modifications and additions. The stated purpose of the Act is to enable law enforcement officials to track down and punish those responsible for the attacks and to protect against similar attacks. The Act grants federal officials greater powers to trace and intercept terrorists' communications both for law enforcement and foreign intelligence purposes. It reinforces federal anti-money laundering laws and regulations in an effort to deny terrorists the resources necessary for future attacks. It tightens our immigration laws to close our borders to foreign terrorists and to expel those among us. Finally, it creates a few new federal crimes, such as the one outlawing terrorist attacks on mass transit; increases the penalties for many others; and institutes several procedural changes, such as a longer statute of limitations for crimes of terrorism. Critics have suggested that it may go too far. The authority to monitor e-mail traffic, to share grand jury information with intelligence and immigration officers, to confiscate property, and to impose new book-keeping requirements on financial institutions, are among the features troubling to some. The Act itself responds to some of those reservations. Many of the wiretapping and foreign intelligence amendments sunset on 31 December 2005. The Act creates judicial safeguards for e-mail monitoring and grand jury disclosures; recognises innocent owner defences to forfeiture; and entrusts enhanced anti-money laundering powers to those regulatory authorities whose concerns include the well being of our financial institutions.
(source: Nielsen Book Data)9781590335628 20160528
Law Library (Crown)
Book
iii, 212 p. ; 24 cm.
SAL3 (off-campus storage)
Book
iii, 263 p. ; 24 cm.
SAL3 (off-campus storage)
Book
1 online resource : text file, PDF
  • Know the Terrorist Your Mission: Critical Awareness Who They Are: Identifying Terrorist Operatives Intelligence Profiling Suspected Terrorists Terrorist Training Terrorism 101: Why the Terrorist Chooses This Path What Terrorists Believe Identifying the Terrorist Group and Its Cells Terrorist Group Organization The Terrorist Cell Terrorist Strategies and Target Selection Detection of Key Terrorist Activities Terrorist Preparations for Attack The Terrorist's Tools: Conventional Weapons Identification The Terrorist's Tools: Nuclear, Biological, and Chemical Weapons and Equipment Predicting an Attack Terrorist Surveillance Techniques Detecting Infiltration and Special Mission Techniques The Decision and Attack Sequence: The Last Chance to Stop and Attack The Basics of Analyzing Intelligence and Predicting Terrorism Events Point of Danger: Law Enforcement Traffic Stops and Encountering Terrorists Terrorist Operations and Tactics The New Fields of Terror A Primer on al-Qaeda and the Global Extremist Insurgency Suicide Terrorism: Tactics, Equipment, and Management Terrorism and Insurgency in Iraq and the Changing Middle East (2003-2013) Supplemental Data: Bibliography and Appendices Bibliography Appendix A: Global Terrorist Groups Appendix B: Explosives Components and Ingredients Checklist Index.
  • (source: Nielsen Book Data)9781466554573 20160612
First published in 2003, Terrorist Recognition Handbook: A Practitioner's Manual for Predicting and Identifying Terrorist Activities remains one of the only books available to provide detailed information on terrorist methodology-revealing terrorist motivation, organizational structure, planning, financing, and operational tactics to carry out attacks. This fully revised and updated third edition contains the detailed analysis and history of prior editions with completely new case studies and information on new and emerging terrorist practices and trends. Updates to the third edition include: * The newest geopolitical challenges and terrorism to emerge from the geopolitical climate post-Arab Spring * Details on the newest attack tactics and procedures of al-Qaeda including al-Qaeda of the Arabian Peninsula, the Islamic Maghreb, and East and North Africa * Lessons learned from recent terrorist operations and information gained from plots foiled by the FBI in the U.S. * Current strategic factors and regional variables affecting global terrorism and regional insurgencies * Potential points of failure in terrorist operations where plots can be most easily detected and disrupted * The increasing trend of self radicalized, Internet- educated "lone wolf" operations, as demonstrated in the Boston Marathon bombing * The rebirth of U.S. and European militia groups Written for counterterrorism practitioners who risk their lives to uncover planned attacks on civilian populations, this book will serve as a guide to train intelligence operatives, law enforcement entities, and military intelligence agents and soldiers to recognize and disrupt the various stages of developing terrorist plots.
(source: Nielsen Book Data)9781466554573 20160612
Book
1 online resource (203 p.)
  • Agradecimientos
  • Prólogo para la edición española
  • Introducción
  • I. Etimologías: terror o bien del sobrevivir
  • II. Etimologías: horror o bien del desmembramiento
  • III. De la guerra
  • IV. El alarido de Medusa
  • V. La vulnerabilidad del inerme
  • VI. El crimen de Medea
  • VII. Horrorismo: de la violencia sobre el inerme
  • VIII. Quien ha visto a la Gorgona
  • IX. Auschwitz o del horror extremo
  • X. Eróticas carnicerías
  • XI. Tan mutilado que pudiera ser el cuerpo de un cerdo
  • XII. El placer del guerrero
  • XIII. Agresividad planetaria
  • XIV. Para una historia del terror
  • XV. Horrorismo suicida
  • XVI. Cuando la bomba es un cuerpo de mujer
  • XVII. Torturadoras que sonríen al objetivo
  • Apéndice: The horror! The horror! Releyendo a Conrad
  • Índice de nombres.
Book
150 p. ; 20 cm.
SAL1&2 (on-campus shelving)
Book
311 p. ; 24 cm.
SAL1&2 (on-campus shelving)
Book
231 p. ; 21 cm.
Green Library
Book
316 p. : col. ill. ; 21 cm.
SAL3 (off-campus storage)
Book
283 p. : ill., maps, port. ; 21 cm.
SAL3 (off-campus storage)
Book
209 p. ; 20 cm.
SAL1&2 (on-campus shelving)

Looking for different results?

Modify your search: Search all fields

Search elsewhere: Search WorldCat Search library website