|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
JSTOR_ocn559031517 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
100318s2009 cau ob 000 0 eng d |
010 |
|
|
|z 2009018478
|
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d OCLCE
|d OCLCQ
|d E7B
|d IDEBK
|d DOS
|d OCLCQ
|d EBLCP
|d MHW
|d OCLCQ
|d B24X7
|d YDXCP
|d OCLCQ
|d JSTOR
|d OCLCF
|d UBY
|d OCLCQ
|d OCLCO
|d EJB
|d DEBSZ
|d OCLCQ
|d CUS
|d AGLDB
|d PIFSG
|d OCLCQ
|d MERUC
|d OCLCQ
|d VT2
|d OCLCA
|d WY@
|d LOA
|d LND
|d LUE
|d ICG
|d U3W
|d VTS
|d CEF
|d REC
|d ICN
|d EZ9
|d AU@
|d OCLCQ
|d ERL
|d JBG
|d WYU
|d STF
|d TXR
|d NJT
|d HS0
|d OCLCQ
|d UKBTH
|d OCLCQ
|d K6U
|d OCLCQ
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 354972910
|a 609104243
|a 616737866
|a 620436307
|a 656140727
|a 748210299
|a 816361316
|a 977475035
|a 992109298
|a 1006967173
|a 1008949916
|a 1039133796
|a 1047934833
|a 1054117703
|a 1066439573
|a 1069453723
|a 1109090108
|a 1113579473
|a 1115111273
|a 1119090886
|a 1125691569
|a 1154206915
|
020 |
|
|
|a 9780833048646
|q (electronic bk.)
|
020 |
|
|
|a 0833048643
|q (electronic bk.)
|
020 |
|
|
|a 1282451162
|
020 |
|
|
|a 9781282451162
|
020 |
|
|
|a 9786612451164
|
020 |
|
|
|a 6612451165
|
020 |
|
|
|z 9780833047311
|q (pbk. ;
|q alk. paper)
|
020 |
|
|
|z 0833047310
|q (pbk. ;
|q alk. paper)
|
027 |
|
|
|a RAND/OP-256-RC
|
029 |
1 |
|
|a AU@
|b 000048836911
|
029 |
1 |
|
|a AU@
|b 000051546276
|
029 |
1 |
|
|a AU@
|b 000054171377
|
029 |
1 |
|
|a DEBBG
|b BV043144989
|
029 |
1 |
|
|a DEBSZ
|b 421916273
|
029 |
1 |
|
|a GBVCP
|b 100865339X
|
035 |
|
|
|a (OCoLC)559031517
|z (OCoLC)354972910
|z (OCoLC)609104243
|z (OCoLC)616737866
|z (OCoLC)620436307
|z (OCoLC)656140727
|z (OCoLC)748210299
|z (OCoLC)816361316
|z (OCoLC)977475035
|z (OCoLC)992109298
|z (OCoLC)1006967173
|z (OCoLC)1008949916
|z (OCoLC)1039133796
|z (OCoLC)1047934833
|z (OCoLC)1054117703
|z (OCoLC)1066439573
|z (OCoLC)1069453723
|z (OCoLC)1109090108
|z (OCoLC)1113579473
|z (OCoLC)1115111273
|z (OCoLC)1119090886
|z (OCoLC)1125691569
|z (OCoLC)1154206915
|
037 |
|
|
|a 22573/cttd8vf
|b JSTOR
|
042 |
|
|
|a dlr
|
043 |
|
|
|a n-us---
|
050 |
|
4 |
|a UA23
|b .J257 2009eb
|
072 |
|
7 |
|a POL
|x 037000
|2 bisacsh
|
072 |
|
7 |
|a POL037000
|2 bisacsh
|
072 |
|
7 |
|a JPWL, TTM
|2 bicssc
|
082 |
0 |
4 |
|a 355/.033573
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Jackson, Brian A.,
|d 1972-
|
245 |
1 |
0 |
|a Emerging threats and security planning :
|b how should we decide what hypothetical threats to worry about? /
|c Brian A. Jackson, David R. Frelinger.
|
260 |
|
|
|a Santa Monica, CA :
|b RAND,
|c 2009.
|
300 |
|
|
|a 1 online resource (x, 19 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a RAND Corporation occasional paper series ;
|v OP-256-RC
|
504 |
|
|
|a Includes bibliographical references (pages 17-19).
|
520 |
|
|
|a "Concerns about how terrorists might attack in the future are central to the design of security efforts to protect both individual targets and the nation overall. In thinking about emerging threats, security planners are confronted by a panoply of possible future scenarios coming from sources ranging from the terrorists themselves to red-team brainstorming efforts to explore ways adversaries might attack in the future. This paper explores an approach to assessing emerging and/or novel threats and deciding whether, or how much, they should concern security planners by asking two questions: (1) Are some of the novel threats 'niche threats' that should be addressed within existing security efforts? (2) Which of the remaining threats are attackers most likely to execute successfully and should therefore be of greater concern for security planners? If threats can reasonably be considered niche threats, they can be prudently addressed in the context of existing security activities. If threats are unusual enough, suggest significant new vulnerabilities, or their probability or consequences means they cannot be considered lesser included cases within other threats, prioritizing them based on their ease of execution provides a guide for which threats merit the greatest concern and most security attention. This preserves the opportunity to learn from new threats yet prevents security planners from being pulled in many directions simultaneously by attempting to respond to every threat at once."--Page 4 of cover.
|
505 |
0 |
|
|a Cover; Preface; Contents; Tables; Summary; Emerging Threats and Security Planning: How Should We Decide What Hypothetical Threats to Worry About?; The Variety of Emerging Threats Challenging Security Planning; Framing a Middle-Ground Approach to Addressing Emerging Threats; Identifying Niche Threats; Prioritizing Emerging Threat Scenarios; Conclusions: Security Planning for the Niche and the Novel; References.
|
588 |
0 |
|
|a Print version record.
|
506 |
|
|
|3 Use copy
|f Restrictions unspecified
|2 star
|5 MiAaHDL
|
533 |
|
|
|a Electronic reproduction.
|b [Place of publication not identified] :
|c HathiTrust Digital Library,
|d 2010.
|5 MiAaHDL
|
538 |
|
|
|a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
|u http://purl.oclc.org/DLF/benchrepro0212
|5 MiAaHDL
|
583 |
1 |
|
|a digitized
|c 2010
|h HathiTrust Digital Library
|l committed to preserve
|2 pda
|5 MiAaHDL
|
546 |
|
|
|a English.
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Open Access
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
650 |
|
0 |
|a National security
|z United States
|x Planning.
|
650 |
|
0 |
|a Terrorism
|z United States
|x Prevention.
|
651 |
|
0 |
|a United States
|x Defenses
|x Planning.
|
650 |
|
0 |
|a Strategic planning
|z United States.
|
650 |
|
0 |
|a Civil defense
|z United States.
|
651 |
|
6 |
|a États-Unis
|x Défense nationale
|x Planification.
|
650 |
|
6 |
|a Planification stratégique
|z États-Unis.
|
650 |
|
7 |
|a POLITICAL SCIENCE
|x Political Freedom & Security
|x Terrorism.
|2 bisacsh
|
650 |
|
7 |
|a POLITICAL SCIENCE
|x Terrorism.
|2 bisacsh
|
650 |
|
7 |
|a Civil defense.
|2 fast
|0 (OCoLC)fst00862456
|
650 |
|
7 |
|a Military readiness
|x Planning.
|2 fast
|0 (OCoLC)fst01353790
|
650 |
|
7 |
|a National security
|x Planning.
|2 fast
|0 (OCoLC)fst01033734
|
650 |
|
7 |
|a Strategic planning.
|2 fast
|0 (OCoLC)fst01134371
|
650 |
|
7 |
|a Terrorism
|x Prevention.
|2 fast
|0 (OCoLC)fst01148123
|
651 |
|
7 |
|a United States.
|2 fast
|0 (OCoLC)fst01204155
|
650 |
|
7 |
|a Armies.
|2 hilcc
|
650 |
|
7 |
|a Military & Naval Science.
|2 hilcc
|
650 |
|
7 |
|a Law, Politics & Government.
|2 hilcc
|
700 |
1 |
|
|a Frelinger, Dave.
|
776 |
0 |
8 |
|i Print version:
|a Jackson, Brian A., 1972-
|t Emerging threats and security planning.
|d Santa Monica, CA : RAND, 2009
|z 9780833047311
|w (DLC) 2009018478
|w (OCoLC)320131993
|
830 |
|
0 |
|a Occasional paper (Rand Corporation) ;
|v OP-256-RC.
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.7249/op256rc
|z Texto completo
|
887 |
|
|
|a ProductForm=BC
|2 onix
|
887 |
|
|
|a Publisher/PublisherName=RAND Corporation
|2 onix
|
938 |
|
|
|a Books 24x7
|b B247
|n bkg00033326
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL475034
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10355424
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 304905
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n 245116
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 3151702
|
994 |
|
|
|a 92
|b IZTAP
|