Information Warfare.
This book introduces policy, government, and security professionals to the concept of "information warfare," covering its evolution over the last decade and its developments among such economic and political giants as China, Russia, Japan, India, and Singapore. The text describes various c...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés Francés |
Publicado: |
London :
Wiley,
2012.
|
Colección: | ISTE.
|
Temas: | |
Acceso en línea: | Texto completo |
MARC
LEADER | 00000cam a2200000Mu 4500 | ||
---|---|---|---|
001 | EBOOKCENTRAL_ocn823722243 | ||
003 | OCoLC | ||
005 | 20240329122006.0 | ||
006 | m o d | ||
007 | cr |n||||||||| | ||
008 | 130109s2012 enk ob 001 0 eng d | ||
040 | |a EBLCP |b eng |e pn |c EBLCP |d OCLCQ |d YDXCP |d OCLCO |d OCLCF |d OCLCO |d OCLCQ |d OCLCO |d DEBSZ |d OCLCO |d OCLCQ |d OCLCO |d MERUC |d OCLCQ |d ZCU |d OCLCA |d ICG |d OCLCQ |d DKC |d AU@ |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 823577513 | ||
020 | |a 9781118381540 | ||
020 | |a 1118381548 | ||
020 | |z 9781848210943 | ||
020 | |z 1848210949 | ||
029 | 1 | |a DEBBG |b BV044171790 | |
029 | 1 | |a DEBSZ |b 43129450X | |
029 | 1 | |a DEBSZ |b 449339858 | |
035 | |a (OCoLC)823722243 |z (OCoLC)823577513 | ||
041 | 1 | |a eng |h fre | |
050 | 4 | |a U163.A77 .V384 2012 | |
082 | 0 | 4 | |a 004 |
049 | |a UAMI | ||
100 | 1 | |a Ventre, Daniel. | |
245 | 1 | 0 | |a Information Warfare. |
260 | |a London : |b Wiley, |c 2012. | ||
300 | |a 1 online resource (566 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a ISTE | |
505 | 0 | |a Cover; Title Page; Copyright; Abbreviations; Introduction; Chapter 1: The United States; 1.1. Information warfare in the 1990s; 1.1.1. Points of view from security experts; 1.1.1.1. Official military documents; 1.1.2. US Air Force doctrine: AFDD 2-5 (1998); 1.1.2.1. Superiority of information; 1.1.2.2. Information operations; 1.1.2.3. Information warfare; 1.1.3. The doctrine of the Joint Chiefs of Staff committee: JP 3-13 (1998); 1.1.3.1. Superiority of information; 1.1.3.2. Information operations; 1.1.3.3. Information warfare; 1.1.4. Components of information warfare. | |
505 | 8 | |a 1.1.4.1. Psychological operations1.1.4.2. Electronic warfare; 1.1.4.3. Military deception; 1.1.4.4. Operations security; 1.1.4.5. Information assurance; 1.1.4.6. Computer network attacks; 1.2. Information warfare in the 2000s; 1.2.1. Dictionary of the Department of Defense; 1.2.2. US Air Force: AFDD 2-5 (2005) and AFPD 10-7 (2006); 1.2.3. The doctrine of the Joint Chiefs of Staff committee: JP 3-13 (2006); 1.3. Other important concepts and reflections; 1.3.1. Cyberspace and superiority of information; 1.3.2. The "value" of information; 1.3.3. Information system. | |
505 | 8 | |a 1.3.4. Command and control warfare: C2W1.3.5. Effect-Based Operations (EBOs); 1.3.6. Information-in-warfare; 1.3.7. The OODA loop; 1.3.8. Fourth generation warfare; 1.3.9. Noosphere; 1.3.10. RMA; 1.3.11. C4ISR; 1.3.12. Network Centric Warfare (NCW); 1.3.13. ISR: intelligence, surveillance, reconnaissance; 1.3.14. Cyberwar; 1.3.15. Netwar; 1.3.16. Spin doctoring; 1.3.17. Intelligence; 1.3.18. Information operations; 1.4. Loss of information control; 1.5. American concerns; Chapter 2: China; 2.1. The concept of "information warfare": a genesis; 2.1.1. General Wang Pufeng: one of the pioneers. | |
505 | 8 | |a 2.1.2. Colonel Wang Baocun2.1.3. Colonels Qiao Liang and Wang Xiangsui: out of bounds war; 2.1.3.1. A series of observations on the modern world; 2.1.3.2. Governments no longer battle each other the same way; 2.1.3.3. Reflection on the importance of technique; 2.1.3.4. Dependence on technique; 2.1.3.5. On information warfare; 2.1.4. General Dai Qingmin and Wang Baocun; 2.1.5. General Niu Li, Colonel Li Jiangzhou and Major Xu Dehui; 2.1.6. 2004 white book on national defense; 2.1.7. Sun Tzu and information warfare; 2.1.8. How to implement the theories. | |
505 | 8 | |a 2.1.8.1. Army training centers and simulation exercises2.1.8.2. Forming specialists in defense; 2.1.8.3. Should a specialized army corps be created?; 2.1.8.4. Real attacks?; 2.2. The American perspective on Chinese information warfare, modernization and informatization of the PLA; 2.2.1. Interpretation problems; 2.2.2. The impenetrability of China; 2.2.3. Information warfare; 2.2.3.1. The Chinese version may only be a copy of the American version; 2.2.3.2. What would the objectives of Chinese information warfare be?; 2.2.3.3. Capacity reinforcement of information warfare. | |
500 | |a 2.2.3.4. What would Chinese targets be? | ||
520 | |a This book introduces policy, government, and security professionals to the concept of "information warfare," covering its evolution over the last decade and its developments among such economic and political giants as China, Russia, Japan, India, and Singapore. The text describes various conceptions of information warfare, along with how they function in military, diplomatic, political, and economic contexts. Recent notable cyber attacks are analyzed, the challenges faced by countries who fail to secure their cyberspace (Japan, the US, etc.) are enumerated, and ways to distinguish between cybe. | ||
588 | 0 | |a Print version record. | |
504 | |a Includes bibliographical references and index. | ||
546 | |a Translated from the French. | ||
590 | |a ProQuest Ebook Central |b Ebook Central Academic Complete | ||
650 | 0 | |a Business intelligence. | |
650 | 0 | |a Trade secrets. | |
650 | 0 | |a Information technology |x Security measures. | |
650 | 0 | |a Computer security |x Management. | |
650 | 0 | |a Data protection. | |
650 | 6 | |a Secrets commerciaux. | |
650 | 6 | |a Technologie de l'information |x Sécurité |x Mesures. | |
650 | 6 | |a Sécurité informatique |x Gestion. | |
650 | 6 | |a Protection de l'information (Informatique) | |
650 | 7 | |a Business intelligence |2 fast | |
650 | 7 | |a Computer security |x Management |2 fast | |
650 | 7 | |a Data protection |2 fast | |
650 | 7 | |a Information technology |x Security measures |2 fast | |
650 | 7 | |a Trade secrets |2 fast | |
758 | |i has work: |a Information warfare (Text) |1 https://id.oclc.org/worldcat/entity/E39PCH7FQrfdPycwt9rPBx67Vy |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Ventre, Daniel. |t Information Warfare. |d London : Wiley, ©2012 |z 9781848210943 |
830 | 0 | |a ISTE. | |
856 | 4 | 0 | |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1106528 |z Texto completo |
938 | |a ProQuest Ebook Central |b EBLB |n EBL1106528 | ||
938 | |a YBP Library Services |b YANK |n 10450457 | ||
994 | |a 92 |b IZTAP |