Computational Analysis of Connectivity Games with Applications to Terrorist Networks