Weapons of Mass Destruction and Terrorism / Edition 1

Paperback (Print)
Buy New
Buy New from BN.com
$80.21
Buy Used
Buy Used from BN.com
$60.50
(Save 34%)
Item is in good condition but packaging may have signs of shelf wear/aging or torn packaging.
Condition: Used – Good details
Used and New from Other Sellers
Used and New from Other Sellers
from $1.99
Usually ships in 1-2 business days
(Save 97%)
Other sellers (Paperback)
  • All (25) from $1.99   
  • New (2) from $9.99   
  • Used (23) from $1.99   

Overview

In WEAPONS OF MASS DESTRUCTION AND TERRORISM, Brigadier General (Retired) Russell Howard and Dr. James Forest have collected original and previously published seminal articles and essays by scientists, academics, government officials, and members of the nation’s security and intelligence communities. The editors and several of the authors write from practical field experience in nonproliferation and counterterrorism efforts. Others have had significant responsibility for developing government policies to address the threat of weapons of mass destruction and terrorism. The contributors include a majority of the significant names in the field including Bruce Hoffman, Brian Jenkins, Jonathan Tucker, Rohan Gunaratna, David Franz, Richard Betts, William Rosenau, and David Albright.

Unit One of the book introduces key terms and addresses important strategic and policy debates. Authors explain how the new forms of terrorism affect the post-9/11 security environment and introduce the notion that weapons of mass destruction could give terrorists short-term, asymmetric attack advantages over conventional military forces. Unit Two offers detailed accounts of the characteristics, availability, and dangers of specific types of WMD, along with four case studies that associate theory with practice—an important feature of this volume. Unit Three deals with past, present, and future national and international responses to—and defenses against—the threat of WMD terrorism. And in the final section of the volume, authors predict future WMD threats and seek to draw on past events and mistakes in order to identify lessons and strategies for the future.

Appendices include a primer on bioterrorism and fact sheets on chemical, biological, nuclear and radiological terrorism.

Read More Show Less

Product Details

  • ISBN-13: 9780073379708
  • Publisher: McGraw-Hill Companies,Inc.
  • Publication date: 3/12/2007
  • Series: Textbook Series
  • Edition description: Older Edition
  • Edition number: 1
  • Pages: 624
  • Product dimensions: 7.50 (w) x 9.20 (h) x 1.20 (d)

Meet the Author

Brigadier General (retired) Russell D. Howard is an American veteran Special Forces officer, academic, tutor, writer and counter-terrorism strategist. He was the founding Director of the Combating Terrorism Center at West Point and Co-Editor of four McGraw-Hill terrorism focused books: Terrorism and Counterterrorism with Dr. Bruce Hoffman, Weapons of Mass Destruction and Terrorism with Dr. James J. F. Forest, Homeland Security and Terrorism with Dr. James J. F. Forest and Lieutenant Colonel Joanne Moore, and Defeating Terrorism with Lieutenant Colonel Reid L. Sawyer.

Dr. James Forest has published over a dozen books and teaches courses on terrorism and homeland security for military, law enforcement, and civilian programs.

Read More Show Less

Table of Contents

Unit I. IntroductionChapter 1.1 Definitions, Trends, and the Concept of "New Terrorism"

1.1a. Russell D. Howard, from "The New Terrorism and Weapons of Mass Destruction," An Original Essay Written for This Volume
1.1b. Brian Michael Jenkins, from "The New Age of Terrorism," in David G. Kamien, ed., The McGraw-Hill Homeland Security Handbook (McGraw-Hill, 2006)
Chapter 1.2 The Nature of the Post-9/11 WMD Terrorism Threat
1.2a. Thomas Homer-Dixon, from "The Rise of Complex Terrorism," Foreign Policy (January/February 2002)
1.2b. Stewart Patrick, from "Weak States and Global Threats: Fact or Fiction?" The Washington Quarterly (Spring 2006)
Chapter 1.3 The WMD Terrorism Hype
1.3a. Andrew O'Neil, from "Terrorist Use of Weapons of Mass Destruction: How Serious Is the Threat?" Australian Journal of International Affairs (April, 2003)
1.3b. Richard K. Betts, from "The New Threat of Mass Destruction," Foreign Affairs (January/February 1998)
Chapter 1.4 The Terrorist WMD of Choice
1.4a. Leonard A. Cole, from "WMD and Lessons from the Anthrax Attacks," in David G. Kamien, ed., The McGraw-Hill Homeland Security Handbook (McGraw-Hill, 2006)
Unit II. Understanding the ThreatChapter 2.1 Different "Faces" of Nuclear Terrorism
2.1a. Morten Bremer Maerli, Annette Schaper, and Frank Barnaby, from "The Characteristics of Nuclear Terrorist Weapons," American Behavioral Scientist (February 2003)
2.1b. Matthew Bunn and Anthony Wier, from "The Seven Myths of Nuclear Terrorism," Current History (April 2005)
Chapter 2.2 Radiological Dispersal Devices
2.2. Charles D. Ferguson and Joel O. Lubenau, from "Securing U.S. Radioactive Sources," Issues in Science and Technology (Fall 2003)
Chapter 2.3 Sabotage of Nuclear Facilities and Other Critical Infrastructure
2.3a. Gavin Cameron, from “Nuclear Terrorism: Reactors & Radiological Attacks after September 11,” Paper Presented to the IAEAN (November 2, 2001)
2.3b. George Bunn and Chaim Braun, from "Terrorism Potential for Research Reactors Compared with Power Reactors: Nuclear Weapons, ‘Dirty Bombs,’ and Truck Bombs," American Behavioral Scientist (February 2003)
2.3c. Douglas M. Chapin, et al., from "Nuclear Power Plants and Their Fuel as Terrorist Targets," Science (September 20, 2002)
Chapter 2.4 Bioterrorism
2.4a. David Franz, from “Bioterrorism Defense: Controlling the Unknown,” An Original Essay Written for This Volume
2.4b. Christopher F. Chyba and Alex L. Greninger, from "Biotechnology and Bioterrorism: An Unprecedented World," Survival (Summer 2004)
Chapter 2.5 Chemical Terrorism
2.5a. Jonathan B. Tucker, from “Chemical Terrorism: Assessing Threats and Responses,” in Committee on Confronting Terrorism in Russia, eds., High-Impact Terrorism: Proceedings of a Russian-American Workshop (National Academics Press, 2002)
Chapter 2.6 Food Security and Agricultural Terrorism
2.6a. Mark Wheelis, Rocco Casagrande, and Laurence V. Madden, from "Biological Attack on Agriculture: Low-Tech, High-Impact Bioterrorism," BioScience (July 2002)
2.6b. Gavin Cameron, Jason Pate, and Kathleen Vogel, from "Planting Fear: How Real Is the Threat of Agricultural Terrorism?" Bulletin of the Atomic Scientists (September/October 2001)
Chapter 2.7 Cyberterrorism
2.7. James A. Lewis, from “Cybersecurity and Critical Infrastructure Protection,” in James J.F. Forest, ed. Homeland Security: Protecting America’s Targets, Volume III: Critical Infrastructure (Praeger Security International, 2006)
Chapter 2.8 Case Study #1
2.8a. Bruce Hoffman, from “CBRN Terrorism Post-9/11,” An Original Essay Written for This Volume
Chapter 2.8 Case Study #2
2.8b. Adam Dolnik and Rohan Gunaratna, from "Jemaah Islamiyah and the Threat of Chemical and Biological Terrorism," International Centre for Terrorism and Political Violence
Chapter 2.8 Case Study #3
2.8c. Lewis A. Dunn, from “Can al Qaeda Be Deterred from Using Nuclear Weapons?” An Original Essay Written for This Volume
Chapter 2.8 Case Study #4
2.8d. David Albright and Corey Hinderstein, from "Unraveling the A.Q. Khan and Future Proliferation Networks," The Washington Quarterly (Spring 2005)
Unit III. Responding to the ThreatChapter 3.1 Deterrence and Preemption
3.1a. Daniel Whiteneck, from "Deterring Terrorists: Thoughts on a Framework," The Washington Quarterly (Summer 2005)
3.1b. Vera L. Zakem and Danielle R. Miller, from "Stop or Else: Basic Concepts to Deter Violent Non-State Actors," An Original Essay Written for This Volume
Chapter 3.2 Nonproliferation Regimes
3.2. Natasha E. Bajema, from "Assessing the Role of the Nonproliferation Regimes: Are They Relevant Tools for Countering WMD Terrorism?" An Original Essay Written for This Volume
Chapter 3.3 Interdiction and Law Enforcement
3.3. Emma Belcher, from "Interdiction and Law Enforcement to Counter WMD Terrorism—Practical Measures That Should Be Strengthened," An Original Essay Written for This Volume
Chapter 3.4 Case Study #1: The Public Health Response to the 2001 Anthrax Attacks
3.4a. Elin Gurskey, Thomas V. Inglesby, and Tara O'Toole, from "Anthrax 2001: Observations on the Medical and Public Health Response," Biosecurity and Bioterrorism: Biodefense Strategy, Practice, and Science (vol. 1, no. 2, 2003)
Chapter 3.4 Case Study #2: Hurricane Katrina and Emergency Response
3.4b. Crystal Franco, Eric Toner, Richard Waldhorn, Beth Maldin, Tara O'Toole, and Thomas V. Inglesby, from "Systemic Collapse: Medical Care in the Aftermath of Hurricane Katrina," Biosecurity and Bioterrorism: Biodefense Strategy, Practice, and Science (vol. 4, no. 2, 2006)
Chapter 3.4 Case Study #3: The Response to the 1995 Attack in Tokyo, Japan
3.4c. Robyn Pangi, from "Consequence Management in the 1995 Sarin Attacks on the Japanese Subway System," Studies in Conflict & Terrorism (vol. 25, 2002)
Unit IV. Lessons Learned and Future ThreatsChapter 4.1 The Need for a Comprehensive Multidimensional Strategy
4.1a. Jason D. Ellis, from "The Best Defense: Counterproliferation and U.S. National Security," The Washington Quarterly (Spring 2003)
4.1b. Ashton B. Carter, from "How to Counter WMD," Foreign Affairs (September/October 2004)
Chapter 4.2 Gaps in the International Framework for Combating Terrorism
4.2. Chen Zak Kane, from "Gaps in the Framework," An Original Essay Written for This Volume
Chapter 4.3 Future Threats
4.3. Forrest E. Waller, Jr. and Michael A. George, from "Emerging WMD Technologies," An Original Essay Written for This Volume
Chapter 4.4 Conclusion
4.4. James J.F. Forest and Aaron Danis, from "Terrorism and WMD: The Road Ahead," An Original Essay Written for This Volume
Appendix
A.1. The White House, from National Strategy to Combat Weapons of Mass Destruction (U.S. Government, December 2002)
A.2a. U.S. Department of Homeland Security, from Chemical Attack: Warfare Agents, Industrial Chemicals, and Toxins (National Academy of Sciences, 2004)
A.2b. U.S. Department of Homeland Security, from Radiological Attack: Dirty Bombs and Other Devices (National Academy of Sciences, 2004)
A.2c. U.S. Department of Homeland Security, from Nuclear Attack (National Academy of Sciences, 2005)
A.2d. U.S. Department of Homeland Security, from Biological Attack: Human Pathogens, Biotoxins, and Agricultural Threats (National Academy of Sciences, 2004)
A.3. Jeffrey Pommerville, from “Integrating the Agents of Bioterrorism into the General Biology Curriculum,” The American Biology Teacher (November/December 2002)
A.4. Margaret E. Kosal, from “Near Term Threats of Chemical Weapons Terrorism,” Strategic Insights (July 2006)
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)