dc.creator | Byman, Daniel | en |
dc.date.accessioned | 2016-09-14T14:10:21Z | en |
dc.date.available | 2016-09-14T14:10:21Z | en |
dc.date.created | 2014-10-01 | en |
dc.identifier.bibliographicCitation | Security Studies Program of the Walsh School of Foreign Service | en |
dc.identifier.other | APT-BAG: georgetown.edu.10822_1041759.tar;APT-ETAG: b935d48a943577a654710aa3ff8c48bf; APT-DATE: 2019-04-24_12:03:04 | en_US |
dc.identifier.uri | http://hdl.handle.net/10822/1041759 | en |
dc.description | Terrorism and Counterterrorism - Section 2 Reading List | en |
dc.description.abstract | Terrorism and Counterterrorism/GeorgetownX/GUIX-501-01x | en |
dc.publisher | Georgetown University | en |
dc.relation.isPartOf | Week [2]: Strategies, Tactics, and Technology Use | en |
dc.rights.uri | http://rightsstatements.org/vocab/InC/1.0/ | |
dc.title | Terrorism and Counterterrorism - Section 2 Reading List | en |
dc.type | text | en |
dc.contributor.repository | DigitalGeorgetown | |
dc.rights.note | For more information about copyright for materials within DigitalGeorgetown, please consult https://www.library.georgetown.edu/copyright/digitalgeorgetown. | |