Cargando…

Cyberwar and information warfare /

Integrating empirical, conceptual, and theoretical approaches, this book presents the thinking of researchers and experts in the fields of cybersecurity, cyberdefense, and information warfare. The aim of this book is to analyze the processes of information warfare and cyberwarfare through the histor...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Ventre, Daniel
Formato: Electrónico eBook
Idioma:Inglés
Publicado: London : Hoboken, NJ : ISTE ; John Wiley, 2011.
Colección:ISTE.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocn827947140
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 130218s2011 enka ob 001 0 eng d
040 |a N$T  |b eng  |e pn  |c N$T  |d YDXCP  |d DG1  |d IDEBK  |d E7B  |d OCLCF  |d UMI  |d UKDOC  |d DEBBG  |d EBLCP  |d MHW  |d OCLCQ  |d COO  |d OCLCQ  |d DG1  |d LIP  |d OCLCQ  |d CEF  |d WYU  |d U3W  |d OCLCQ  |d UAB  |d UKAHL  |d VT2  |d OCLCQ  |d LUU  |d OCLCO  |d OCLCQ 
019 |a 827207661  |a 878048968  |a 878049080  |a 878049294  |a 878059852  |a 900202431  |a 992825351  |a 1066508869  |a 1103268000  |a 1141290671  |a 1152982820  |a 1192345842  |a 1240514159 
020 |a 9781118603390  |q (electronic bk.) 
020 |a 1118603397  |q (electronic bk.) 
020 |a 9781118603482  |q (electronic bk.) 
020 |a 1118603486  |q (electronic bk.) 
020 |a 9781118603512 
020 |a 1118603516 
020 |z 9781848213043 
020 |z 1848213042 
029 1 |a AU@  |b 000055873275 
029 1 |a CHNEW  |b 000599580 
029 1 |a CHNEW  |b 000941218 
029 1 |a CHVBK  |b 480214921 
029 1 |a DEBBG  |b BV041907976 
029 1 |a DEBBG  |b BV042032227 
029 1 |a DEBBG  |b BV043395432 
029 1 |a DEBSZ  |b 414176944 
029 1 |a NZ1  |b 15915663 
035 |a (OCoLC)827947140  |z (OCoLC)827207661  |z (OCoLC)878048968  |z (OCoLC)878049080  |z (OCoLC)878049294  |z (OCoLC)878059852  |z (OCoLC)900202431  |z (OCoLC)992825351  |z (OCoLC)1066508869  |z (OCoLC)1103268000  |z (OCoLC)1141290671  |z (OCoLC)1152982820  |z (OCoLC)1192345842  |z (OCoLC)1240514159 
037 |a CL0500000416  |b Safari Books Online 
050 4 |a U163  |b .C937 2011eb 
072 7 |a HIS  |x 027010  |2 bisacsh 
082 0 4 |a 355.3/43  |2 23 
049 |a UAMI 
245 0 0 |a Cyberwar and information warfare /  |c edited by Daniel Ventre. 
260 |a London :  |b ISTE ;  |a Hoboken, NJ :  |b John Wiley,  |c 2011. 
300 |a 1 online resource (xix, 412 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a ISTE 
504 |a Includes bibliographical references and index. 
588 0 |a Print version record. 
505 0 |a Cover; Cyberwar and Information Warfare; Title Page; Copyright Page; Table of Contents; Introduction; List of Acronyms; Chapter 1. Cyberwar and its Borders; 1.1. The seduction of cyberwar; 1.2. Desirable, vulnerable and frightening information; 1.3. Conflict and its dimensions; 1.4. The Helm and space; 1.5. Between knowledge and violence; 1.6. Space, distance and paths; 1.7. The permanency of war; 1.8. No war without borders; 1.9. The enemy and the sovereign; 1.10. Strengths and weaknesses; 1.11. Bibliography; Chapter 2. War of Meaning, Cyberwar and Democracies; 2.1. Introduction. 
505 8 |a 2.2. Informational environment, a new operating space for strategy2.2.1. War and information: stakes for the West; 2.2.2. Strategy in the information environment; 2.2.3. Winning the battle of legitimacies; 2.3. Influence strategy: defeating and limiting armed force physical involvement; 2.3.1. Describing the aggressor; 2.3.2. Armed forces and the information environment; 2.3.3. The need for moral force; 2.4. Conclusion; 2.5. Bibliography; Chapter 3. Intelligence, the First Defense? Information Warfare and Strategic Surprise; 3.1. Information warfare, information and war. 
505 8 |a 3.2. Intelligence and strategic surprise3.2.1. Strategic surprise; 3.2.2. Perception of surprise; 3.2.3. Perception of the possibility of surprise; 3.3. Strategic surprise and information warfare; 3.4. Concluding remarks: surprise in strategic studies; 3.5. Bibliography; Chapter 4. Cyberconflict: Stakes of Power; 4.1. Stakes of power; 4.1.1. Power relations; 4.1.2. Expression of sovereignty; 4.1.3. Cyberpower; 4.1.4. Measuring and locating power; 4.1.5. Limits of exercising power; 4.1.6. The Monroe doctrine; 4.1.7. Globalization; 4.1.8. Shock theories; 4.1.9. Naval and maritime power strategy. 
505 8 |a 4.1.10. Air/space and cybernetic power: analogies4.1.11. Cyberconflict/cyber weapons, chemical/biological weapons: comparisons; 4.1.12. Cyberconflict/cyber weapons, Cold War, nuclear weapons: comparisons; 4.1.13. Cyberconflict and new wars; 4.2. The Stuxnet affair; 4.3. Bibliography; Chapter 5. Operational Aspects of a Cyberattack: Intelligence, Planning and Conduct; 5.1. Introduction; 5.2. Towards a broader concept of cyberwar; 5.2.1. War and cyberwar: common ground; 5.2.2. New orders in cyberwar; 5.2.3. Who are cyberwarriors?; 5.2.4. Is formalization possible? 
505 8 |a 5.3. Concept of critical infrastructure5.3.1. Generalized definition of the notion of critical infrastructure; 5.3.2. System interdependence; 5.4. Different phases of a cyberattack; 5.4.1. Intelligence phase; 5.4.2. Planning phase; 5.4.3. Conduct phase; 5.5. A few "elementary building blocks"; 5.5.1. General tactical framework; 5.5.2. Attacks on people; 5.5.3. Opinion manipulation and area control; 5.5.4. Military computer attack in a conventional operation; 5.6. Example scenario; 5.6.1. Tactical scenario; 5.6.2. The order of events; 5.6.3. Analysis; 5.7. Conclusion; 5.8. Bibliography. 
520 |a Integrating empirical, conceptual, and theoretical approaches, this book presents the thinking of researchers and experts in the fields of cybersecurity, cyberdefense, and information warfare. The aim of this book is to analyze the processes of information warfare and cyberwarfare through the historical, operational and strategic perspectives of cyberattacks. Cyberwar and Information Warfare is of extreme use to experts in security studies and intelligence studies, defense universities, ministries of defense and security, and anyone studying political sciences, international relations, g. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Information warfare. 
650 0 |a Psychological warfare. 
650 0 |a Computer crimes. 
650 6 |a Guerre de l'information. 
650 6 |a Guerre psychologique. 
650 6 |a Criminalité informatique. 
650 7 |a HISTORY  |x Military  |x Biological & Chemical Warfare.  |2 bisacsh 
650 7 |a Computer crimes.  |2 fast  |0 (OCoLC)fst00872063 
650 7 |a Information warfare.  |2 fast  |0 (OCoLC)fst00973186 
650 7 |a Psychological warfare.  |2 fast  |0 (OCoLC)fst01081405 
700 1 |a Ventre, Daniel. 
776 0 8 |i Print version:  |t Cyberwar and information warfare.  |d London : ISTE ; Hoboken, NJ : John Wiley, 2011  |z 9781848213043  |w (DLC) 2011024020  |w (OCoLC)729721299 
830 0 |a ISTE. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781118603512/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a 123Library  |b 123L  |n 63897 
938 |a Askews and Holts Library Services  |b ASKH  |n AH24971874 
938 |a Askews and Holts Library Services  |b ASKH  |n AH24971879 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL1120650 
938 |a ebrary  |b EBRY  |n ebr10657635 
938 |a EBSCOhost  |b EBSC  |n 531528 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis24807266 
938 |a YBP Library Services  |b YANK  |n 9985054 
938 |a YBP Library Services  |b YANK  |n 10001759 
938 |a YBP Library Services  |b YANK  |n 10195989 
994 |a 92  |b IZTAP