000860081 000__ 01635cam\a2200421Ii\4500 000860081 001__ 860081 000860081 005__ 20230306145334.0 000860081 006__ m\\\\\o\\d\\\\\\\\ 000860081 007__ cr\cn\nnnunnun 000860081 008__ 180716t20192019sz\\\\\\ob\\\\001\0\eng\d 000860081 020__ $$a9783319909240$$q(electronic book) 000860081 020__ $$a331990924X$$q(electronic book) 000860081 020__ $$z9783319909233 000860081 035__ $$aSP(OCoLC)on1044733866 000860081 035__ $$aSP(OCoLC)1044733866 000860081 040__ $$aN$T$$beng$$erda$$epn$$cN$T$$dN$T$$dOCLCF$$dFIE$$dYDX$$dMERER$$dOCLCQ$$dYDXIT$$dUAB$$dUKMGB$$dLEAUB 000860081 049__ $$aISEA 000860081 050_4 $$aHV6431$$b.L457 2019 000860081 08204 $$a363.32517$$223 000860081 1001_ $$aLehr, Peter,$$eauthor. 000860081 24510 $$aCounter-terrorism technologies :$$ba critical assessment /$$cPeter Lehr. 000860081 264_1 $$aCham :$$bSpringer,$$c[2019] 000860081 264_4 $$c©2019 000860081 300__ $$a1 online resource. 000860081 336__ $$atext$$btxt$$2rdacontent 000860081 337__ $$acomputer$$bc$$2rdamedia 000860081 338__ $$aonline resource$$bcr$$2rdacarrier 000860081 4901_ $$aAdvanced sciences and technologies for security applications 000860081 504__ $$aIncludes bibliographical references and index. 000860081 506__ $$aAccess limited to authorized users. 000860081 588__ $$aDescription based on online resource; title from digital title page (viewed on January 09, 2019). 000860081 650_0 $$aTerrorism$$xPrevention$$xTechnological innovations. 000860081 650_0 $$aNational security$$xTechnological innovations. 000860081 830_0 $$aAdvanced sciences and technologies for security applications. 000860081 852__ $$bebk 000860081 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-90924-0$$zOnline Access$$91397441.1 000860081 909CO $$ooai:library.usi.edu:860081$$pGLOBAL_SET 000860081 980__ $$aEBOOK 000860081 980__ $$aBIB 000860081 982__ $$aEbook 000860081 983__ $$aOnline 000860081 994__ $$a92$$bISE