top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Crimes of power & states of impunity [[electronic resource] ] : the U.S. response to terror / / Michael Welch
Crimes of power & states of impunity [[electronic resource] ] : the U.S. response to terror / / Michael Welch
Autore Welch Michael, Ph. D.
Pubbl/distr/stampa New Brunswick, N.J., : Rutgers University Press, c2009
Descrizione fisica 1 online resource (238 p.)
Disciplina 363.325/1560973
Collana Critical issues in crime and society
Soggetto topico Terrorism - Government policy - United States
National security - United States
Intelligence service - United States
Subversive activities - United States
ISBN 9786612033551
1-282-03355-7
0-8135-4650-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Frontmatter -- Contents -- Preface and Acknowledgments -- Part I. Presenting History -- 1. A Post-9/11 World -- 2. A New Configuration of Power -- Part II. Prime Targeting -- 3. Unlawful Enemy Combatants -- 4. Guantánamo Bay -- 5. Torture -- Part III. Expanding Range -- 6. Ordering Iraq -- 7. Collateral Damage -- Part IV. Lasting Legacies -- 8. Governing through Terror -- 9. States of Impunity -- Appendix -- Notes -- Cases -- References -- Index -- About the Author
Altri titoli varianti Crimes of power and states of impunity
Record Nr. UNINA-9910782686103321
Welch Michael, Ph. D.  
New Brunswick, N.J., : Rutgers University Press, c2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Crimes of power & states of impunity [[electronic resource] ] : the U.S. response to terror / / Michael Welch
Crimes of power & states of impunity [[electronic resource] ] : the U.S. response to terror / / Michael Welch
Autore Welch Michael, Ph. D.
Edizione [1st ed.]
Pubbl/distr/stampa New Brunswick, N.J., : Rutgers University Press, c2009
Descrizione fisica 1 online resource (238 p.)
Disciplina 363.325/1560973
Collana Critical issues in crime and society
Soggetto topico Terrorism - Government policy - United States
National security - United States
Intelligence service - United States
Subversive activities - United States
ISBN 9786612033551
1-282-03355-7
0-8135-4650-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Frontmatter -- Contents -- Preface and Acknowledgments -- Part I. Presenting History -- 1. A Post-9/11 World -- 2. A New Configuration of Power -- Part II. Prime Targeting -- 3. Unlawful Enemy Combatants -- 4. Guantánamo Bay -- 5. Torture -- Part III. Expanding Range -- 6. Ordering Iraq -- 7. Collateral Damage -- Part IV. Lasting Legacies -- 8. Governing through Terror -- 9. States of Impunity -- Appendix -- Notes -- Cases -- References -- Index -- About the Author
Altri titoli varianti Crimes of power and states of impunity
Record Nr. UNINA-9910811094403321
Welch Michael, Ph. D.  
New Brunswick, N.J., : Rutgers University Press, c2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Critical infrastructure protection [[electronic resource] ] : progress coordinating government and private sector efforts varies by sectors' characteristics : report to congressional requesters
Critical infrastructure protection [[electronic resource] ] : progress coordinating government and private sector efforts varies by sectors' characteristics : report to congressional requesters
Pubbl/distr/stampa [Washington, D.C.] : , : U.S. Government Accountability Office, , [2006]
Descrizione fisica ii, 63 pages : digital, PDF file
Soggetto topico Computer networks - Security measures - United States
Computer security - United States - Planning
Terrorism - United States - Prevention
Terrorism - Government policy - United States
Civil defense - United States
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Critical infrastructure protection
Record Nr. UNINA-9910695447003321
[Washington, D.C.] : , : U.S. Government Accountability Office, , [2006]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Critical infrastructure protection in homeland security : defending a networked nation / / Ted G. Lewis
Critical infrastructure protection in homeland security : defending a networked nation / / Ted G. Lewis
Autore Lewis T. G (Theodore Gyle), <1941->
Edizione [Second edition.]
Pubbl/distr/stampa Hoboken, New Jersey : , : John Wiley & Sons, Inc., , 2015
Descrizione fisica 1 online resource (399 p.)
Disciplina 005.8
Soggetto topico Computer networks - Security measures - United States
Computer security - United States - Planning
Terrorism - United States - Prevention
Terrorism - Government policy - United States
Civil defense - United States
Public utilities - Protection - United States
Soggetto genere / forma Electronic books.
ISBN 1-118-81766-4
1-118-81770-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation; Copyright; Contents; Preface; How to Use this Book; Acknowledgment; Part I Origins of Homeland Security and Critical Infrastructure Protection Policy; Chapter 1 Origins of Critical Infrastructure Protection; 1.1 Recognition; 1.2 Natural Disaster Recovery; 1.3 Definitional Phase; 1.4 Public-Private Cooperation; 1.5 Federalism: Whole of Government; 1.6 Infrastructure Protection within DHS; 1.7 Implementing a Risk Strategy; 1.7.1 Risk-Informed Decision-Making; 1.7.2 Resilience-Informed Decision-Making
1.7.3 Prevention or Response? 1.8 Analysis; 1.8.1 The PPP Conundrum; 1.8.2 The Information-Sharing Conundrum; 1.8.3 Climate Change Conundrum; 1.8.4 The Funding Conundrum; 1.8.5 Spend 80% on 20% of the Country; 1.9 Exercises; References; Part II Theory and Foundations; Chapter 2 Risk Strategies; 2.1 EUT; 2.1.1 Threat-Asset Pairs; 2.2 PRA and Fault Trees; 2.2.1 An Example: Your Car; 2.3 MBRA and Resource Allocation; 2.3.1 Another Example: Redundant Power; 2.4 PRA in the Supply Chain; 2.5 Protection versus Response; 2.6 Threat Is an Output; 2.7 Bayesian Belief Networks; 2.8 A BN for Threat
2.9 Risk of a Natural Disaster 2.10 Earthquakes; 2.11 Black Swans and Risk; 2.12 Black Swan Floods; 2.13 Are Natural Disasters Getting Worse?; 2.14 Black Swan al Qaeda Attacks; 2.15 Black Swan Pandemic; 2.16 Risk and Resilience; 2.17 Exercises; References; Chapter 3 Theories of Catastrophe; 3.1 NAT; 3.2 Blocks and Springs; 3.3 Bak's Punctuated Equilibrium Theory; 3.4 TOC; 3.4.1 The State Space Diagram; 3.5 The U.S. Electric Power Grid; 3.6 POE; 3.6.1 The Great Recessions; 3.6.2 Too Much Money; 3.7 Competitive Exclusion; 3.7.1 Gause's Law; 3.7.2 The Self-Organizing Internet; 3.7.3 A Monoculture
3.8 POR 3.9 Resilience of Complex Infrastructure Systems; 3.9.1 Expected Utility and Risk; 3.9.2 SOC; 3.9.3 TOC; 3.9.4 POE and nonlinearity; 3.9.5 CEP and loss of redundancy; 3.9.6 POR and percolation; 3.10 Emergence; 3.10.1 Opposing Forces in Emergent CIKR; 3.11 Exercises; References; Chapter 4 Complex CIKR Systems; 4.1 CIKR as Networks; 4.1.1 Emergence; 4.1.2 Classes of CIKR Networks; 4.1.3 Self-Organized Networks; 4.2 Cascading CIKR Systems; 4.2.1 The Fundamental Resilience Equation; 4.2.2 Targeted Attacks; 4.3 Network Flow Resilience; 4.4 Paradox of Redundancy
4.4.1 Link Percolation and Robustness 4.4.2 Node Percolation and Robustness; 4.4.3 Blocking Nodes; 4.5 Network Risk; 4.5.1 Crude Oil and KeystoneXL; 4.5.2 MBRA Network Resource Allocation; 4.6 Exercises; Reference; Part III Individual Sectors; Chapter 5 Communications; 5.1 Early Years; 5.2 Regulatory Structure; 5.3 The Architecture of the Communication Sector; 5.3.1 Physical Infrastructure; 5.3.2 Wireless Networks; 5.3.3 Extraterrestrial Communication; 5.3.4 LESs; 5.3.5 Cellular Networks; 5.3.6 Generations; 5.3.7 Wi-Fi Technology; 5.4 Risk Analysis; 5.4.1 Importance of Carrier Hotels
5.4.2 Network Analysis
Record Nr. UNINA-9910463519003321
Lewis T. G (Theodore Gyle), <1941->  
Hoboken, New Jersey : , : John Wiley & Sons, Inc., , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Critical infrastructure protection in homeland security : defending a networked nation / / Ted G. Lewis
Critical infrastructure protection in homeland security : defending a networked nation / / Ted G. Lewis
Autore Lewis T. G (Theodore Gyle), <1941->
Edizione [Second edition.]
Pubbl/distr/stampa Hoboken, New Jersey : , : John Wiley & Sons, Inc., , 2015
Descrizione fisica 1 online resource (399 p.)
Disciplina 005.8
Soggetto topico Computer networks - Security measures - United States
Computer security - United States - Planning
Terrorism - United States - Prevention
Terrorism - Government policy - United States
Civil defense - United States
Public utilities - Protection - United States
ISBN 1-118-81766-4
1-118-81770-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation; Copyright; Contents; Preface; How to Use this Book; Acknowledgment; Part I Origins of Homeland Security and Critical Infrastructure Protection Policy; Chapter 1 Origins of Critical Infrastructure Protection; 1.1 Recognition; 1.2 Natural Disaster Recovery; 1.3 Definitional Phase; 1.4 Public-Private Cooperation; 1.5 Federalism: Whole of Government; 1.6 Infrastructure Protection within DHS; 1.7 Implementing a Risk Strategy; 1.7.1 Risk-Informed Decision-Making; 1.7.2 Resilience-Informed Decision-Making
1.7.3 Prevention or Response? 1.8 Analysis; 1.8.1 The PPP Conundrum; 1.8.2 The Information-Sharing Conundrum; 1.8.3 Climate Change Conundrum; 1.8.4 The Funding Conundrum; 1.8.5 Spend 80% on 20% of the Country; 1.9 Exercises; References; Part II Theory and Foundations; Chapter 2 Risk Strategies; 2.1 EUT; 2.1.1 Threat-Asset Pairs; 2.2 PRA and Fault Trees; 2.2.1 An Example: Your Car; 2.3 MBRA and Resource Allocation; 2.3.1 Another Example: Redundant Power; 2.4 PRA in the Supply Chain; 2.5 Protection versus Response; 2.6 Threat Is an Output; 2.7 Bayesian Belief Networks; 2.8 A BN for Threat
2.9 Risk of a Natural Disaster 2.10 Earthquakes; 2.11 Black Swans and Risk; 2.12 Black Swan Floods; 2.13 Are Natural Disasters Getting Worse?; 2.14 Black Swan al Qaeda Attacks; 2.15 Black Swan Pandemic; 2.16 Risk and Resilience; 2.17 Exercises; References; Chapter 3 Theories of Catastrophe; 3.1 NAT; 3.2 Blocks and Springs; 3.3 Bak's Punctuated Equilibrium Theory; 3.4 TOC; 3.4.1 The State Space Diagram; 3.5 The U.S. Electric Power Grid; 3.6 POE; 3.6.1 The Great Recessions; 3.6.2 Too Much Money; 3.7 Competitive Exclusion; 3.7.1 Gause's Law; 3.7.2 The Self-Organizing Internet; 3.7.3 A Monoculture
3.8 POR 3.9 Resilience of Complex Infrastructure Systems; 3.9.1 Expected Utility and Risk; 3.9.2 SOC; 3.9.3 TOC; 3.9.4 POE and nonlinearity; 3.9.5 CEP and loss of redundancy; 3.9.6 POR and percolation; 3.10 Emergence; 3.10.1 Opposing Forces in Emergent CIKR; 3.11 Exercises; References; Chapter 4 Complex CIKR Systems; 4.1 CIKR as Networks; 4.1.1 Emergence; 4.1.2 Classes of CIKR Networks; 4.1.3 Self-Organized Networks; 4.2 Cascading CIKR Systems; 4.2.1 The Fundamental Resilience Equation; 4.2.2 Targeted Attacks; 4.3 Network Flow Resilience; 4.4 Paradox of Redundancy
4.4.1 Link Percolation and Robustness 4.4.2 Node Percolation and Robustness; 4.4.3 Blocking Nodes; 4.5 Network Risk; 4.5.1 Crude Oil and KeystoneXL; 4.5.2 MBRA Network Resource Allocation; 4.6 Exercises; Reference; Part III Individual Sectors; Chapter 5 Communications; 5.1 Early Years; 5.2 Regulatory Structure; 5.3 The Architecture of the Communication Sector; 5.3.1 Physical Infrastructure; 5.3.2 Wireless Networks; 5.3.3 Extraterrestrial Communication; 5.3.4 LESs; 5.3.5 Cellular Networks; 5.3.6 Generations; 5.3.7 Wi-Fi Technology; 5.4 Risk Analysis; 5.4.1 Importance of Carrier Hotels
5.4.2 Network Analysis
Record Nr. UNINA-9910787944403321
Lewis T. G (Theodore Gyle), <1941->  
Hoboken, New Jersey : , : John Wiley & Sons, Inc., , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Critical infrastructure protection in homeland security : defending a networked nation / / Ted G. Lewis
Critical infrastructure protection in homeland security : defending a networked nation / / Ted G. Lewis
Autore Lewis T. G (Theodore Gyle), <1941->
Edizione [Second edition.]
Pubbl/distr/stampa Hoboken, New Jersey : , : John Wiley & Sons, Inc., , 2015
Descrizione fisica 1 online resource (399 p.)
Disciplina 005.8
Soggetto topico Computer networks - Security measures - United States
Computer security - United States - Planning
Terrorism - United States - Prevention
Terrorism - Government policy - United States
Civil defense - United States
Public utilities - Protection - United States
ISBN 1-118-81766-4
1-118-81770-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation; Copyright; Contents; Preface; How to Use this Book; Acknowledgment; Part I Origins of Homeland Security and Critical Infrastructure Protection Policy; Chapter 1 Origins of Critical Infrastructure Protection; 1.1 Recognition; 1.2 Natural Disaster Recovery; 1.3 Definitional Phase; 1.4 Public-Private Cooperation; 1.5 Federalism: Whole of Government; 1.6 Infrastructure Protection within DHS; 1.7 Implementing a Risk Strategy; 1.7.1 Risk-Informed Decision-Making; 1.7.2 Resilience-Informed Decision-Making
1.7.3 Prevention or Response? 1.8 Analysis; 1.8.1 The PPP Conundrum; 1.8.2 The Information-Sharing Conundrum; 1.8.3 Climate Change Conundrum; 1.8.4 The Funding Conundrum; 1.8.5 Spend 80% on 20% of the Country; 1.9 Exercises; References; Part II Theory and Foundations; Chapter 2 Risk Strategies; 2.1 EUT; 2.1.1 Threat-Asset Pairs; 2.2 PRA and Fault Trees; 2.2.1 An Example: Your Car; 2.3 MBRA and Resource Allocation; 2.3.1 Another Example: Redundant Power; 2.4 PRA in the Supply Chain; 2.5 Protection versus Response; 2.6 Threat Is an Output; 2.7 Bayesian Belief Networks; 2.8 A BN for Threat
2.9 Risk of a Natural Disaster 2.10 Earthquakes; 2.11 Black Swans and Risk; 2.12 Black Swan Floods; 2.13 Are Natural Disasters Getting Worse?; 2.14 Black Swan al Qaeda Attacks; 2.15 Black Swan Pandemic; 2.16 Risk and Resilience; 2.17 Exercises; References; Chapter 3 Theories of Catastrophe; 3.1 NAT; 3.2 Blocks and Springs; 3.3 Bak's Punctuated Equilibrium Theory; 3.4 TOC; 3.4.1 The State Space Diagram; 3.5 The U.S. Electric Power Grid; 3.6 POE; 3.6.1 The Great Recessions; 3.6.2 Too Much Money; 3.7 Competitive Exclusion; 3.7.1 Gause's Law; 3.7.2 The Self-Organizing Internet; 3.7.3 A Monoculture
3.8 POR 3.9 Resilience of Complex Infrastructure Systems; 3.9.1 Expected Utility and Risk; 3.9.2 SOC; 3.9.3 TOC; 3.9.4 POE and nonlinearity; 3.9.5 CEP and loss of redundancy; 3.9.6 POR and percolation; 3.10 Emergence; 3.10.1 Opposing Forces in Emergent CIKR; 3.11 Exercises; References; Chapter 4 Complex CIKR Systems; 4.1 CIKR as Networks; 4.1.1 Emergence; 4.1.2 Classes of CIKR Networks; 4.1.3 Self-Organized Networks; 4.2 Cascading CIKR Systems; 4.2.1 The Fundamental Resilience Equation; 4.2.2 Targeted Attacks; 4.3 Network Flow Resilience; 4.4 Paradox of Redundancy
4.4.1 Link Percolation and Robustness 4.4.2 Node Percolation and Robustness; 4.4.3 Blocking Nodes; 4.5 Network Risk; 4.5.1 Crude Oil and KeystoneXL; 4.5.2 MBRA Network Resource Allocation; 4.6 Exercises; Reference; Part III Individual Sectors; Chapter 5 Communications; 5.1 Early Years; 5.2 Regulatory Structure; 5.3 The Architecture of the Communication Sector; 5.3.1 Physical Infrastructure; 5.3.2 Wireless Networks; 5.3.3 Extraterrestrial Communication; 5.3.4 LESs; 5.3.5 Cellular Networks; 5.3.6 Generations; 5.3.7 Wi-Fi Technology; 5.4 Risk Analysis; 5.4.1 Importance of Carrier Hotels
5.4.2 Network Analysis
Record Nr. UNINA-9910814551603321
Lewis T. G (Theodore Gyle), <1941->  
Hoboken, New Jersey : , : John Wiley & Sons, Inc., , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Critical infrastructure protection in homeland security [[electronic resource] ] : defending a networked nation / / Ted G. Lewis
Critical infrastructure protection in homeland security [[electronic resource] ] : defending a networked nation / / Ted G. Lewis
Autore Lewis T. G (Theodore Gyle), <1941->
Pubbl/distr/stampa Hoboken, N.J., : Wiley-Interscience, c2006
Descrizione fisica 1 online resource (488 p.)
Disciplina 005.8
Soggetto topico Computer networks - Security measures - United States
Computer security - United States - Planning
Terrorism - United States - Prevention
Terrorism - Government policy - United States
Civil defense - United States
ISBN 1-280-41147-3
9786610411474
0-470-36282-0
0-471-78954-2
0-471-78953-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Strategy -- Origins -- Challenges -- Networks -- Vulnerability analysis -- Risk analysis -- Water -- SCADA -- Power -- Energy -- Telecommunications -- Internet -- Cyber-threats -- Cyber-security.
Record Nr. UNINA-9910143421103321
Lewis T. G (Theodore Gyle), <1941->  
Hoboken, N.J., : Wiley-Interscience, c2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Critical infrastructure protection in homeland security [[electronic resource] ] : defending a networked nation / / Ted G. Lewis
Critical infrastructure protection in homeland security [[electronic resource] ] : defending a networked nation / / Ted G. Lewis
Autore Lewis T. G (Theodore Gyle), <1941->
Pubbl/distr/stampa Hoboken, N.J., : Wiley-Interscience, c2006
Descrizione fisica 1 online resource (488 p.)
Disciplina 005.8
Soggetto topico Computer networks - Security measures - United States
Computer security - United States - Planning
Terrorism - United States - Prevention
Terrorism - Government policy - United States
Civil defense - United States
ISBN 1-280-41147-3
9786610411474
0-470-36282-0
0-471-78954-2
0-471-78953-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Strategy -- Origins -- Challenges -- Networks -- Vulnerability analysis -- Risk analysis -- Water -- SCADA -- Power -- Energy -- Telecommunications -- Internet -- Cyber-threats -- Cyber-security.
Record Nr. UNINA-9910830149303321
Lewis T. G (Theodore Gyle), <1941->  
Hoboken, N.J., : Wiley-Interscience, c2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Critical infrastructure protection in homeland security [[electronic resource] ] : defending a networked nation / / Ted G. Lewis
Critical infrastructure protection in homeland security [[electronic resource] ] : defending a networked nation / / Ted G. Lewis
Autore Lewis T. G (Theodore Gyle), <1941->
Pubbl/distr/stampa Hoboken, N.J., : Wiley-Interscience, c2006
Descrizione fisica 1 online resource (488 p.)
Disciplina 005.8
Soggetto topico Computer networks - Security measures - United States
Computer security - United States - Planning
Terrorism - United States - Prevention
Terrorism - Government policy - United States
Civil defense - United States
ISBN 1-280-41147-3
9786610411474
0-470-36282-0
0-471-78954-2
0-471-78953-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Strategy -- Origins -- Challenges -- Networks -- Vulnerability analysis -- Risk analysis -- Water -- SCADA -- Power -- Energy -- Telecommunications -- Internet -- Cyber-threats -- Cyber-security.
Record Nr. UNINA-9910841602103321
Lewis T. G (Theodore Gyle), <1941->  
Hoboken, N.J., : Wiley-Interscience, c2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Culture of terrorism / / Noam Chomsky
Culture of terrorism / / Noam Chomsky
Autore Chomsky Noam
Pubbl/distr/stampa London, England : , : Pluto Press, , 1989
Descrizione fisica 1 online resource (333 p.)
Disciplina 327.73
Collana Chomsky Perspectives
Soggetto topico Terrorism - Government policy - United States
Iran-Contra Affair, 1985-1990
Soggetto genere / forma Electronic books.
ISBN 1-78371-241-4
1-78371-240-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910461141003321
Chomsky Noam  
London, England : , : Pluto Press, , 1989
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui

Data di pubblicazione

Altro...