Manhunting : a methodology for finding persons of national interest
暂无分享,去创建一个
[1] Paul K. Huth. Extended Deterrence and the Prevention of War , 1988 .
[2] Richards J. Heuer,et al. Psychology of Intelligence Analysis , 1999 .
[3] Yaakov Yavin,et al. Pursuit-evasion differential games , 1987 .
[4] Brian C. O'Connor,et al. Hunting and Gathering on the Information Savanna , 2003 .
[5] Paul K. Davis,et al. Deterrence and Influence in Counterterrorism: A Component in the War on Al Qaeda , 2002 .
[6] W. Shepard. What is "Islamic fundamentalism"? , 1988 .
[7] Amer Latif,et al. Ghost Wars: The Secret History of the CIA, Afghanistan, and Bin Laden,from the Soviet Invasion to September 10, 2001, , 2005 .
[8] Robin Moore. Hunting Down Saddam: The Inside Story of the Search and Capture , 2004 .
[9] Scott Gerwehr,et al. Unweaving the Web: Deception and Adaptation in Future Urban Operations , 2003 .
[10] Robin Moore,et al. The Hunt for Bin Laden: Task Force Dagger , 2003 .
[11] Max Boot,et al. The Savage Wars Of Peace: Small Wars And The Rise Of American Power , 2002 .
[12] P. Sztompka. Trust: A Sociological Theory , 2000 .
[13] Scott Gerwehr,et al. The Art of Darkness: Deception and Urban Operations , 2000 .
[14] M. Thackrey. In the Mind's Eye: Enhancing Human Performance , 1993 .
[15] Roy Godson,et al. Strategic denial and deception , 2000 .
[16] Marc Sageman,et al. Understanding terror networks. , 2004, International journal of emergency mental health.
[17] Albert-László Barabási,et al. Linked - how everything is connected to everything else and what it means for business, science, and everyday life , 2003 .
[18] Benjamin Disraeli. From The Columbia World of Quotations , 1996 .
[19] Rowan Scarborough. Rumsfeld's War: The Untold Story of America's Anti-Terrorist Commander , 2004 .
[20] Stanley Wasserman,et al. Social Network Analysis: Methods and Applications , 1994, Structural analysis in the social sciences.
[21] Brian Michael Jenkins,et al. Countering Al Qaeda , 2002 .