Cargando…

Counterdeception principles and applications for national security /

Today, more than ever, the use of denial and deception (D & D) is being used to compensate for an opponent?s military superiority, to obtain or develop weapons of mass destruction, and to violate international agreements and sanctions. Although the historical literature on the use of strategic d...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Bennett, Michael J., 1958-
Otros Autores: Waltz, Edward
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Norwood, MA : Artech House, 2007.
Colección:Artech House intelligence and information operations library.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBOOKCENTRAL_ocn427509686
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cn|||||||||
008 070522s2007 maua ob 001 0 eng d
040 |a CaPaEBR  |b eng  |e pn  |c COCUF  |d OCLCQ  |d N$T  |d YDXCP  |d E7B  |d OCLCQ  |d MERUC  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCF  |d OCLCO  |d OCLCQ  |d EBLCP  |d MHW  |d OCLCQ  |d AZK  |d LOA  |d JBG  |d AGLDB  |d PIFPO  |d ZCU  |d OCLCQ  |d U3W  |d OCLCA  |d KIJ  |d STF  |d WRM  |d OCLCQ  |d VTS  |d NRAMU  |d ICG  |d VT2  |d CUY  |d AU@  |d OCLCQ  |d WYU  |d DKC  |d OCLCQ  |d M8D  |d UKAHL  |d OCLCQ  |d UKCRE  |d AJS  |d IEEEE  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL  |d TWT 
019 |a 245534376  |a 476154891  |a 646757780  |a 961592560  |a 962564919  |a 966211233  |a 991952419  |a 1037788459  |a 1038625826  |a 1045491130  |a 1055362095  |a 1058386437  |a 1065086263  |a 1081198033  |a 1153504384  |a 1228541373  |a 1388675996 
020 |a 9781580539364  |q (electronic bk.) 
020 |a 158053936X  |q (electronic bk.) 
020 |z 9781580539357 
020 |z 1580539351 
029 1 |a AU@  |b 000048831566 
029 1 |a AU@  |b 000051358610 
029 1 |a DEBBG  |b BV043114049 
029 1 |a DEBBG  |b BV044129175 
029 1 |a DEBSZ  |b 422136212 
029 1 |a GBVCP  |b 80295829X 
029 1 |a NZ1  |b 13103379 
035 |a (OCoLC)427509686  |z (OCoLC)245534376  |z (OCoLC)476154891  |z (OCoLC)646757780  |z (OCoLC)961592560  |z (OCoLC)962564919  |z (OCoLC)966211233  |z (OCoLC)991952419  |z (OCoLC)1037788459  |z (OCoLC)1038625826  |z (OCoLC)1045491130  |z (OCoLC)1055362095  |z (OCoLC)1058386437  |z (OCoLC)1065086263  |z (OCoLC)1081198033  |z (OCoLC)1153504384  |z (OCoLC)1228541373  |z (OCoLC)1388675996 
050 4 |a U167.5.D37  |b B46 2007eb 
072 7 |a HIS  |x 027060  |2 bisacsh 
072 0 |a TEC025000 
082 0 4 |a 355.41  |2 22 
049 |a UAMI 
100 1 |a Bennett, Michael J.,  |d 1958- 
245 1 0 |a Counterdeception principles and applications for national security /  |c Michael Bennett, Edward Waltz. 
260 |a Norwood, MA :  |b Artech House,  |c 2007. 
300 |a 1 online resource (xiv, 335 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file 
490 1 |a Artech House intelligence and information operations library 
504 |a Includes bibliographical references and index. 
588 0 |a Print version record. 
505 0 |a Foreword; Preface; Chapter 1 Deception and the Need for Counterdeception 1; Chapter 2 Introduction to Deception Principles; Chapter 3 The Cognitive Aspects of Deception: Why Does Deception Work?; Chapter 4 Technical Methods of Deception; Chapter 5 Principles of Counterdeception; Chapter 6 Nontechnical Approaches to Counterdeception; Chapter 7 Technical Methods of Counterdeception; Chapter 8 Counterdeception Architectures and Technologies; Chapter 9 Speculations About the Future of Deception and Counterdeception; About the Authors; Index. 
520 |a Today, more than ever, the use of denial and deception (D & D) is being used to compensate for an opponent?s military superiority, to obtain or develop weapons of mass destruction, and to violate international agreements and sanctions. Although the historical literature on the use of strategic deception is widely available, technical coverage of the subject is scattered in hard-to-find and out-of-print sources. This is the first technical volume to offer a current, comprehensive and systematic overview of the concepts and methods that underlie strategic deception and, more importantly, to provid. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Deception (Military science) 
650 0 |a Disinformation. 
650 0 |a National security. 
650 6 |a Déception (Science militaire) 
650 6 |a Désinformation. 
650 7 |a HISTORY  |x Military  |x Strategy.  |2 bisacsh 
650 7 |a Deception (Military science)  |2 fast 
650 7 |a Disinformation  |2 fast 
650 7 |a National security  |2 fast 
700 1 |a Waltz, Edward. 
758 |i has work:  |a Counterdeception principles and applications for national security (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGVhmXVmQXdpTFwkMjCQhd  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Bennett, Michael.  |t Counterdeception principles and applications for national security.  |d Norwood, MA : Artech House, 2007  |w (DLC) 2007275485 
830 0 |a Artech House intelligence and information operations library. 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=338754  |z Texto completo 
936 |a BATCHLOAD 
938 |a Askews and Holts Library Services  |b ASKH  |n AH28882017 
938 |a EBL - Ebook Library  |b EBLB  |n EBL338754 
938 |a IEEE  |b IEEE  |n 9100308 
938 |a EBSCOhost  |b EBSC  |n 225182 
938 |a YBP Library Services  |b YANK  |n 2870095 
994 |a 92  |b IZTAP