Indian Mujahideen (Record no. 96623)

000 -LEADER
fixed length control field 03910nam a22005295i 4500
001 - CONTROL NUMBER
control field 978-3-319-02818-7
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20140220082841.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 131108s2013 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783319028187
-- 978-3-319-02818-7
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-3-319-02818-7
Source of number or code doi
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.D343
072 #7 - SUBJECT CATEGORY CODE
Subject category code UNF
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code UYQE
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM021030
Source bisacsh
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 006.312
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Subrahmanian, V.S.
Relator term author.
245 10 - TITLE STATEMENT
Title Indian Mujahideen
Medium [electronic resource] :
Remainder of title Computational Analysis and Public Policy /
Statement of responsibility, etc by V.S. Subrahmanian, Aaron Mannes, Animesh Roul, R.K. Raghavan.
264 #1 -
-- Cham :
-- Springer International Publishing :
-- Imprint: Springer,
-- 2013.
300 ## - PHYSICAL DESCRIPTION
Extent XVIII, 173 p. 22 illus.
Other physical details online resource.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
490 1# - SERIES STATEMENT
Series statement Terrorism, Security, and Computation,
International Standard Serial Number 2197-8778
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Introduction -- Indian Mujahideen (IM) -- Temporal Probabilistic Behavior Rules -- Targeting Public Sites -- Bombings -- Simultaneous and Timed Attacks -- Total Deaths in IM Attacks -- Computing Policy Options -- Suggested Counter-Terrorism Policies -- Building a National Counter-Terrorism Center -- Appendix A: Data Methodology -- Appendix B: List of All Terrorist Attacks Carried out by IM -- Appendix C: Temporal Probabilistic Rules Presented in This Book -- Appendix D: Instances of Improved Diplomatic Relations between India and Pakistan -- Appendix E: Instances of Indian Mujahideen Conferences -- Appendix F: Indian Mujahideen Claims of Responsibility for Attacks -- Appendix G: Instances of Indian Mujahideen Communications about its Terror Campaign.
520 ## - SUMMARY, ETC.
Summary, etc Advance Praise for Indian Mujahideen: Computational Analysis and Public Policy “This book presents a highly innovative computational approach to analyzing the strategic behavior of terrorist groups and formulating counter-terrorism policies. It would be very useful for international security analysts and policymakers.” Uzi Arad, National Security Advisor to the Prime Minister of Israel and Head, Israel National Security Council (2009-2011) “An important book on a complex security problem. Issues have been analysed in depth based on quality research. Insightful and well-balanced in describing the way forward.” Naresh Chandra, Indian Ambassador to the USA (1996-2001) and Cabinet Secretary (1990-1992). “An objective and clinical account of the origins, aims, extra-territorial links and modus-operandi,  of a growingly dangerous terrorist organization that challenges  the federal, democratic, secular and pluralistic ethos of India’s polity.  The authors have meticulously researched and analysed the multi-faceted challenges that the “Indian Mujahideen” poses and realistically dwelt on the ways in which these challenges could be faced and overcome.” G. Parthasarathy, High Commissioner of India to Australia (1995-1998) and Pakistan (1998-2000). Foreword by the Hon. Louis J. Freeh
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer science.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data mining.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Criminology.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer Science.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data Mining and Knowledge Discovery.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Political Science, general.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Criminology & Criminal Justice.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Public International Law.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Mannes, Aaron.
Relator term author.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Roul, Animesh.
Relator term author.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Raghavan, R.K.
Relator term author.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer eBooks
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783319028170
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Terrorism, Security, and Computation,
-- 2197-8778
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-3-319-02818-7
912 ## -
-- ZDB-2-SCS

No items available.

2017 | The Technical University of Kenya Library | +254(020) 2219929, 3341639, 3343672 | library@tukenya.ac.ke | Haile Selassie Avenue