Cargando…

Information Warfare.

This book introduces policy, government, and security professionals to the concept of "information warfare," covering its evolution over the last decade and its developments among such economic and political giants as China, Russia, Japan, India, and Singapore. The text describes various c...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Ventre, Daniel
Formato: Electrónico eBook
Idioma:Inglés
Francés
Publicado: London : Wiley, 2012.
Colección:ISTE.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mu 4500
001 EBOOKCENTRAL_ocn823722243
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|||||||||
008 130109s2012 enk ob 001 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d OCLCQ  |d YDXCP  |d OCLCO  |d OCLCF  |d OCLCO  |d OCLCQ  |d OCLCO  |d DEBSZ  |d OCLCO  |d OCLCQ  |d OCLCO  |d MERUC  |d OCLCQ  |d ZCU  |d OCLCA  |d ICG  |d OCLCQ  |d DKC  |d AU@  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 823577513 
020 |a 9781118381540 
020 |a 1118381548 
020 |z 9781848210943 
020 |z 1848210949 
029 1 |a DEBBG  |b BV044171790 
029 1 |a DEBSZ  |b 43129450X 
029 1 |a DEBSZ  |b 449339858 
035 |a (OCoLC)823722243  |z (OCoLC)823577513 
041 1 |a eng  |h fre 
050 4 |a U163.A77 .V384 2012 
082 0 4 |a 004 
049 |a UAMI 
100 1 |a Ventre, Daniel. 
245 1 0 |a Information Warfare. 
260 |a London :  |b Wiley,  |c 2012. 
300 |a 1 online resource (566 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a ISTE 
505 0 |a Cover; Title Page; Copyright; Abbreviations; Introduction; Chapter 1: The United States; 1.1. Information warfare in the 1990s; 1.1.1. Points of view from security experts; 1.1.1.1. Official military documents; 1.1.2. US Air Force doctrine: AFDD 2-5 (1998); 1.1.2.1. Superiority of information; 1.1.2.2. Information operations; 1.1.2.3. Information warfare; 1.1.3. The doctrine of the Joint Chiefs of Staff committee: JP 3-13 (1998); 1.1.3.1. Superiority of information; 1.1.3.2. Information operations; 1.1.3.3. Information warfare; 1.1.4. Components of information warfare. 
505 8 |a 1.1.4.1. Psychological operations1.1.4.2. Electronic warfare; 1.1.4.3. Military deception; 1.1.4.4. Operations security; 1.1.4.5. Information assurance; 1.1.4.6. Computer network attacks; 1.2. Information warfare in the 2000s; 1.2.1. Dictionary of the Department of Defense; 1.2.2. US Air Force: AFDD 2-5 (2005) and AFPD 10-7 (2006); 1.2.3. The doctrine of the Joint Chiefs of Staff committee: JP 3-13 (2006); 1.3. Other important concepts and reflections; 1.3.1. Cyberspace and superiority of information; 1.3.2. The "value" of information; 1.3.3. Information system. 
505 8 |a 1.3.4. Command and control warfare: C2W1.3.5. Effect-Based Operations (EBOs); 1.3.6. Information-in-warfare; 1.3.7. The OODA loop; 1.3.8. Fourth generation warfare; 1.3.9. Noosphere; 1.3.10. RMA; 1.3.11. C4ISR; 1.3.12. Network Centric Warfare (NCW); 1.3.13. ISR: intelligence, surveillance, reconnaissance; 1.3.14. Cyberwar; 1.3.15. Netwar; 1.3.16. Spin doctoring; 1.3.17. Intelligence; 1.3.18. Information operations; 1.4. Loss of information control; 1.5. American concerns; Chapter 2: China; 2.1. The concept of "information warfare": a genesis; 2.1.1. General Wang Pufeng: one of the pioneers. 
505 8 |a 2.1.2. Colonel Wang Baocun2.1.3. Colonels Qiao Liang and Wang Xiangsui: out of bounds war; 2.1.3.1. A series of observations on the modern world; 2.1.3.2. Governments no longer battle each other the same way; 2.1.3.3. Reflection on the importance of technique; 2.1.3.4. Dependence on technique; 2.1.3.5. On information warfare; 2.1.4. General Dai Qingmin and Wang Baocun; 2.1.5. General Niu Li, Colonel Li Jiangzhou and Major Xu Dehui; 2.1.6. 2004 white book on national defense; 2.1.7. Sun Tzu and information warfare; 2.1.8. How to implement the theories. 
505 8 |a 2.1.8.1. Army training centers and simulation exercises2.1.8.2. Forming specialists in defense; 2.1.8.3. Should a specialized army corps be created?; 2.1.8.4. Real attacks?; 2.2. The American perspective on Chinese information warfare, modernization and informatization of the PLA; 2.2.1. Interpretation problems; 2.2.2. The impenetrability of China; 2.2.3. Information warfare; 2.2.3.1. The Chinese version may only be a copy of the American version; 2.2.3.2. What would the objectives of Chinese information warfare be?; 2.2.3.3. Capacity reinforcement of information warfare. 
500 |a 2.2.3.4. What would Chinese targets be? 
520 |a This book introduces policy, government, and security professionals to the concept of "information warfare," covering its evolution over the last decade and its developments among such economic and political giants as China, Russia, Japan, India, and Singapore. The text describes various conceptions of information warfare, along with how they function in military, diplomatic, political, and economic contexts. Recent notable cyber attacks are analyzed, the challenges faced by countries who fail to secure their cyberspace (Japan, the US, etc.) are enumerated, and ways to distinguish between cybe. 
588 0 |a Print version record. 
504 |a Includes bibliographical references and index. 
546 |a Translated from the French. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Business intelligence. 
650 0 |a Trade secrets. 
650 0 |a Information technology  |x Security measures. 
650 0 |a Computer security  |x Management. 
650 0 |a Data protection. 
650 6 |a Secrets commerciaux. 
650 6 |a Technologie de l'information  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique  |x Gestion. 
650 6 |a Protection de l'information (Informatique) 
650 7 |a Business intelligence  |2 fast 
650 7 |a Computer security  |x Management  |2 fast 
650 7 |a Data protection  |2 fast 
650 7 |a Information technology  |x Security measures  |2 fast 
650 7 |a Trade secrets  |2 fast 
758 |i has work:  |a Information warfare (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCH7FQrfdPycwt9rPBx67Vy  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Ventre, Daniel.  |t Information Warfare.  |d London : Wiley, ©2012  |z 9781848210943 
830 0 |a ISTE. 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1106528  |z Texto completo 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL1106528 
938 |a YBP Library Services  |b YANK  |n 10450457 
994 |a 92  |b IZTAP