An electronic copy of book is available for Library Members Sign in to view the book
Terrorists use network technologies as they plan and stage attacks. This book explores the purpose and manner of the use of these technologies, their net effect, and security forces' possible responses.
Sub Title:
Edition:
Volume:
Publisher:
Publishing Year: 2007
ISBN:
Pages: