Brian A. Jackson

RAND Corporation · Rowman & Littlefield Publishers

titleISBN-13year of publica-
tion
other author(s)
Aptitude for Destruction: Case Studies of Organizational Learning in Five Terrorist Groups, Volume 2: Case Studies of Organizational Learning in Five Terrorist Groups978-0-8330-3767-12005
Aptitude for Destruction, Vol 1: Organizational Learning in Terrorist Groups and its Implications for combating Terrorism978-0-8330-3764-02005
Breaching the Fortress Wall: Understanding Terrorist Efforts to Overcome Defensive Technologies978-0-8330-3914-92006Peter Chalk · Kim R. Cragin · Bruce Newsome Lecturer in International Relations. University of California Berkeley · John V. Parachini
Challenges and Choices for Crime-Fighting Technology Federal Support of State and Local Law Enforcement978-0-8330-3035-12001William Schwabe · Lois M. Davis
Considering the Creation of a Domestic Intelligence Agency in the United States, 2009: Lessons from the Experiences of Australia, Canada, France, Germany, and the United Kingdom978-0-8330-4617-82009Peter Chalk · Richard Warnes · Lindsay Clutterbuck · Aidan Kirby
Efficient Aviation Security: Strengthening the Analytic Foundation for Making Air Transportation Security Decisions978-0-8330-7652-62012Tom LaTourrette · Edward W. Chan · Russell Lundberg · Andrew R. Morral · David R. Frelinger
Emergency Responder Injuries and Fatalities: An Analysis of Surveillance Data978-0-8330-3565-32004Ari Houser · James T. Bartis · D. J. Peterson
Emerging Threats and Security Planning: How Should We Decide What Hypothetical Threats to Worry About?978-0-8330-4731-12009David R. Frelinger
Evaluating Novel Threats to the Homeland: Unmanned Aerial Vehicles and Cruise Missiles978-0-8330-4169-22007David R. Frelinger · Michael J. Lostumbo · Robert W. Button
Evaluating the Reliability of Emergency Response Systems for Large-Scale Incident Operations978-0-8330-5005-22010Kay Sullivan Faith · Henry H. Willis
Fostering Innovation in Community and Institutional Corrections: Identifying High-Priority Technology and Other Needs for the U.S. Corrections Sector978-0-8330-8856-72015Joe Russo · John S. Hollywood · Dulani Woods · Richard Silberglitt · George B. Drake · John S. Shaffer · Mikhail Zaydman
Fostering Innovation in the U.S. Court System: Identifying High-Priority Technology and Other Needs for Improving Court Operations and Outcomes978-0-8330-9535-02016Duren Banks · John S. Hollywood · Dulani Woods · Amanda Royal · Patrick W. Woodson · Nicole J. Johnson
Fostering Innovation in U.S. Law Enforcement: Identifying High-Priority Technology and Other Needs for Improving Law Enforcement Operations and Outcomes978-0-8330-9847-42017John S. Hollywood · Dulani Woods · Sean E. Goodison · Andrew Lauland · Lisa Wagner · Thomas J. Wilson
High-Priority Information Technology Needs for Law Enforcement978-0-8330-8873-42015John S. Hollywood · John E. Boon · Richard Silberglitt · Brian G. Chow
How Do We Know What Information Sharing Is Really Worth?: Exporing Methodologies to Measure the Value of Information Sharing and Fusion Efforts978-0-8330-8386-92014
Influences on the Adoption of Multifactor Authentication978-0-8330-5235-32011Martin C. Libicki · Edward Balkovich · Rena Rudavsky · Katharine Watkins Webb
Knowing More, But Accomplishing What?: Developing Approaches to Measure the Effects of Information-Sharing on Criminal Justice Outcomes978-0-8330-9899-32019Lane F. Burgette · Caroline Stevens · Claude Messan Setodji · Erinn Herberman · Stephanie Ann Kovalchik · Katie Mugg · Meagan Cahill
Network Technologies for Networked Terrorists: Assessing the Value of Information and Communication Technologies to Modern Terrorist Organizations978-0-8330-4141-82007Bruce W. Don · David R. Frelinger · Scott Gerwehr · Eric Landree
Protecting Emergency Responders: Lessons Learned From Terrorists Attacks978-0-8330-3149-52002D. J. Peterson · James T. Bartis · Tom LaTourrette · Irene Brahmakulam
Securing America's Passenger-Rail Systems978-0-8330-4117-32008Jeremy M. Wilson · Mel Eisman · Paul Steinberg · Jack K. Riley
Sharing the Dragon's Teeth: Terrorist Groups and the Exchange of New Technologies978-0-8330-3915-62007Kim R. Cragin · Peter Chalk · Sara A. Daly
Stealing the Sword: Limiting Terrorist Use of Advanced Conventional Weapons978-0-8330-3965-12007James Bonomo · Giacomo Bergamo · Dave Frelinger · John Gordon
Teaching Terror: Strategic and Tactical Learning in the Terrorist World978-0-7425-4078-12006James JF Forest · Cindy C. Combs · R Kim Cragin · Rohan Gunaratna author of "Inside al Qaeda: Global Network of Terror" · Michael Kenney · Román D. Ortiz · Kumar Ramakrishna
The Challenge of Domestic Intelligence in a Free Society: A Mulitdisciplinary Look at the Creation of a U.S. Domestic Counterterrorism Intelligence Agency978-0-8330-4616-12009Agnes Gereben Schaefer · Darcy Noricks · Benjamin W. Goldsmith · Genevieve Lester
The Office of Science and Technology Policy Blue Ribbon Panel on the Threat of Biological Terrorism Directed Against Livestock978-0-8330-3633-92004Terrence K. Kelly · Peter Chalk · James Bonomo · John V. Parachini
The Problem of Measuring Emergency Preparedness: The Need for Assessing "Response Reliability" as Part of Homeland Security Planning978-0-8330-4622-22007
The Role of Technology in Improving K-12 School Safety978-0-8330-9474-22016Heather L. Schwartz · Rajeev Ramchand · Dionne Barnes-Proby · Sean Grant · Kristin J. Leuschner · Mauri Matsuda · Jessica Saunders
Understanding the Role of Deterrence in Counterterrorism Security978-0-8330-4914-82010Andrew R. Morral
Visions of Law Enforcement Technology in the Period 2024-2034: Report of the Law Enforcement Futuring Workshop978-0-8330-8879-62015Richard Silberglitt · Brian G. Chow · John S. Hollywood · Dulani Woods · Mikhail Zaydman
What Should Be Classified?: A Framework with Application to the Global Force Management Data Initiative978-0-8330-5001-42011Martin C. Libicki · David R. Frelinger · Beth E. Lachman · Cesse Ip

A. J. · A. Jackson · B. A. · B A Jackson · B. Jackson · Brian A. · Brian A. Jackson PhD · Brian J · Brian Jackson

 

Brian A. Jackson PhD