Show simple item record

Files in this item

Cover for Tactics and Technology Use: Conclusion
dc.creatoren
dc.date.accessioned2016-09-14T14:10:23Zen
dc.date.available2016-09-14T14:10:23Zen
dc.date.created2014-10-01en
dc.identifier.bibliographicCitationSecurity Studies Program of the Walsh School of Foreign Serviceen
dc.identifier.otherAPT-BAG: georgetown.edu.10822_1041771.tar;APT-ETAG: 52c941f43f6a54c2b68f0a6ca8816cf6; APT-DATE: 2019-05-28_16:53:04en_US
dc.identifier.urien
dc.descriptionTactics and Technology Use: Conclusionen
dc.description.abstractTerrorism and Counterterrorism/GeorgetownX/GUIX-501-01xen
dc.publisherGeorgetown Universityen
dc.relation.isPartOfWeek [2]: Strategies, Tactics, and Technology Useen
dc.relation.urihttps://mediapilot.georgetown.edu/ssdcms/i.do?u=3ff5729f287a440en
dc.rights.urihttp://rightsstatements.org/vocab/InC/1.0/
dc.titleTactics and Technology Use: Conclusionen
dc.typetexten
dc.contributor.repositoryDigitalGeorgetown
dc.rights.noteFor more information about copyright for materials within DigitalGeorgetown, please consult https://www.library.georgetown.edu/copyright/digitalgeorgetown.


This item appears in the following Collection(s)

Show simple item record