|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
JSTOROA_ocn824512636 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
130115s2013 cau ob 000 0 eng |
010 |
|
|
|a 2013001965
|
040 |
|
|
|a DLC
|b eng
|e rda
|c DLC
|d OCLCF
|d SFB
|d OCLCO
|
019 |
|
|
|a 837527813
|a 870420619
|a 961499397
|a 962651206
|a 968291764
|a 988444074
|a 992088987
|a 1008948235
|a 1037721606
|a 1038582783
|a 1045503189
|a 1055347157
|a 1058374323
|a 1065702671
|a 1081280169
|a 1101719689
|a 1115107423
|a 1153557111
|
020 |
|
|
|a 9780833078841
|q (epub)
|
020 |
|
|
|a 0833078844
|
020 |
|
|
|a 9780833078858
|q (prc)
|
020 |
|
|
|a 0833078852
|
020 |
|
|
|a 9780833078865
|q ( ebook/pdf)
|
020 |
|
|
|a 0833078860
|
020 |
|
|
|z 9780833059123 (pbk. : alk. paper)
|
029 |
1 |
|
|a AU@
|b 000061154955
|
029 |
1 |
|
|a DEBBG
|b BV044177768
|
029 |
1 |
|
|a GBVCP
|b 1008658219
|
029 |
1 |
|
|a NZ1
|b 15025553
|
029 |
1 |
|
|a AU@
|b 000050425513
|
035 |
|
|
|a (OCoLC)824512636
|z (OCoLC)837527813
|z (OCoLC)870420619
|z (OCoLC)961499397
|z (OCoLC)962651206
|z (OCoLC)968291764
|z (OCoLC)988444074
|z (OCoLC)992088987
|z (OCoLC)1008948235
|z (OCoLC)1037721606
|z (OCoLC)1038582783
|z (OCoLC)1045503189
|z (OCoLC)1055347157
|z (OCoLC)1058374323
|z (OCoLC)1065702671
|z (OCoLC)1081280169
|z (OCoLC)1101719689
|z (OCoLC)1115107423
|z (OCoLC)1153557111
|
042 |
|
|
|a pcc
|
043 |
|
|
|a n-us---
|
050 |
0 |
0 |
|a UA23
|
082 |
0 |
0 |
|a 355.3/43
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Porche, Isaac,
|d 1968-
|
245 |
1 |
0 |
|a Redefining information warfare boundaries for an Army in a wireless world /
|c Isaac R. Porche III, Christopher Paul, with Michael York, Chad C. Serena, Jerry M. Sollinger, Elliot Axelband, Endy Y. Min, Bruce J. Held.
|
264 |
|
1 |
|a Santa Monica, CA :
|b RAND,
|c [2013]
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|2 rdacontent
|
337 |
|
|
|a computer
|2 rdamedia
|
338 |
|
|
|a online resource
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references.
|
588 |
|
|
|a Description based on print version record and CIP data provided by publisher.
|
505 |
0 |
|
|a Cover; Title Page; Copyright; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; CHAPTER ONE Introduction; Background; The Army's Role in Cyberspace; What Is Cyberspace?; Environments; Domains; Information Environment; Cyberspace Defined; Cyber-Electromagnetic/Cyber-Electronic Operations; Purpose; Approach; How This Monograph Is Organized; CHAPTER TWO The Information Environment and Information Warfare; The Information Environment; The U.S. Department of Defense View of the Information Environment; Components of the Information Environment; Information Warfare
|
505 |
8 |
|
|a A Definition Debate over the Term; Functional Areas That Compose Information Warfare; The Terms Cyber-Electronic and Cyber-Electromagnetic; CHAPTER THREE The Problem with Information Operations; How Information Operations Are Defined; How Information Operations Are Organized in the Army; Problems with the Current Definition; Misunderstandings and Disagreements; Problems with the Current Organization; Lack of Common Vision for Information Operations; Vision 1: Base Case; Vision 2: Information Operations as a Coordinating and Integrating Function
|
505 |
8 |
|
|a Vision 3: Information Operations as Command-and-Control Warfare Vision 4: Information Operations as Influence Operations; Vision 5: Information Operations as Advocacy; Vision 6: Information Operations as Everything; Information Operations as a Moving Target; CHAPTER FOUR Redefining and Reorganizing Information Operations; Key Questions and Answers to Guide a Redefinition of Information Operations; Discussion on the Role of IO; Confusion over the Terms Operation and Integration; The Need for Advocacy; What Is Being Integrated, Advocated, or Executed?; Key Capabilities Need to Be Included
|
505 |
8 |
|
|a Avoid Long Lists of Capabilities to Define IO Arguments Can Be Made That IO Is Everything; Discussion of Possible Ends to Be Sought; The List of Relevant Capabilities Remains Too Long to Be Useful; Pros and Cons of a Narrow Set of Ends; Information Tasks as Potential Ends; Influence as an End; Command-and-Control Warfare; A Proposed Definition of Information Operations; Proposed Definition; IIO and ITO: Compartmentalizing the Definition; CHAPTER FIVE How Electronic Warfare Overlaps with Other Areas; Analysis of Electronic Warfare and Electromagnetic Spectrum Operations
|
505 |
8 |
|
|a Relationship of Intelligence Capabilities to Electronic Warfare and Cyberspace Operations Signals Intelligence, Electronic Warfare, and Electromagnetic Spectrum Operations; Electronic Warfare and Signals Intelligence; Relationship Between Electronic Warfare and Cyber Operations; Approach: A System Consideration of Cyber Operations; Electronic Warfare as Fielded Today; Chapter Summary and Conclusions; CHAPTER SIX Overlaps Between Public Affairs and Military Information Support Operations; Comparing Public Affairs and Military Information Support Operations; Public Affairs
|
520 |
|
|
|a The U.S. Army is studying ways to apply its cyber power and is reconsidering doctrinally defined areas that are integral to cyberspace operations. An examination of network operations, information operations, and several other, more focused areas across the U.S. military found significant overlap and potential boundary progression that could inform the development of future Army doctrine.
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Open Access
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
610 |
1 |
0 |
|a United States.
|b Army
|x Communication systems.
|
610 |
1 |
7 |
|a United States.
|b Army
|2 fast
|
650 |
|
0 |
|a Information warfare
|z United States.
|
650 |
|
0 |
|a Military doctrine
|z United States.
|
650 |
|
0 |
|a Computer networks
|x Security measures
|z United States
|x Planning.
|
650 |
|
0 |
|a Cyberspace
|x Security measures
|z United States.
|
650 |
|
6 |
|a Guerre de l'information
|z États-Unis.
|
650 |
|
6 |
|a Doctrines militaires
|z États-Unis.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures
|z États-Unis
|x Planification.
|
650 |
|
7 |
|a Armed Forces
|x Communication systems
|2 fast
|
650 |
|
7 |
|a Cyberspace
|x Security measures
|2 fast
|
650 |
|
7 |
|a Information warfare
|2 fast
|
650 |
|
7 |
|a Military doctrine
|2 fast
|
651 |
|
7 |
|a United States
|2 fast
|
700 |
1 |
|
|a Paul, Christopher,
|d 1971-
|
776 |
0 |
8 |
|i Print version:
|a Porche, Isaac, 1968-
|t Redefining information warfare boundaries for an Army in a wireless world
|d Santa Monica, CA : RAND, [2013]
|z 9780833059123
|w (DLC) 2013000702
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.7249/j.ctt3fh1qp
|z Texto completo
|
938 |
|
|
|a Books 24x7
|b B247
|n bkg00054210
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL1365200
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10678750
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 608705
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 10406246
|
994 |
|
|
|a 92
|b IZTAP
|