TY - BOOK AU - Ventre,Daniel TI - Information warfare T2 - Information systems, web and pervasive computing series SN - 9781119277316 AV - HD38.7 .V4713 2016eb U1 - 355.3/43 22 PY - 2016///] CY - London, UK PB - ISTE Ltd., John Wiley & Sons KW - Information warfare KW - Business intelligence KW - Trade secrets KW - Information technology KW - Security measures KW - Computer security KW - Management KW - Data protection KW - Guerre de l'information KW - Secrets commerciaux KW - Technologie de l'information KW - S�ecurit�e KW - Mesures KW - S�ecurit�e informatique KW - Gestion KW - Protection de l'information (Informatique) KW - HISTORY KW - Military KW - Biological & Chemical Warfare KW - bisacsh KW - Other KW - TECHNOLOGY & ENGINEERING KW - Military Science KW - fast KW - ram KW - Guerre �electronique KW - Syst�emes informatiques KW - Mesures de s�uret�e KW - M�edias et relations internationales KW - M�edias KW - Droit N1 - Includes bibliographical references and index; Table of Contents; Title; Copyright; Introduction; 1 The United States; 1.1. Information warfare in the 1990s; 1.2. Information warfare in the 2000s; 1.3. Information warfare in the 2010s; 1.4. Important concepts and reflections; 2 China; 2.1. Significant publications; 2.2. Strategic and doctrinal thinking about information warfare. Genesis; 2.3. Recent policies and strategies on information and cyber security; 2.4. Reflections; 3 Russia; 3.1. Military doctrines and national security strategies; 3.2. Information warfare in practice; 3.3. Comments; 4 Concepts and Theories: Discussions; 4.1. Doctrines4.2. Information warfare: definitions, models; 4.3. Information warfare or data warfare?; Conclusion; Index; End User License Agreement N2 - This book introduces policy, government, and security professionals to the concept of "information warfare," covering its evolution over the last decade and its developments among such economic and political giants as China, Russia, Japan, India, and Singapore. The text describes various conceptions of information warfare, along with how they function in military, diplomatic, political, and economic contexts. Recent notable cyber attacks are analyzed, the challenges faced by countries who fail to secure their cyberspace (Japan, the US, etc.) are enumerated, and ways to distinguish between cybercrime, cyberwarfare, and cyberterrrorism are discussed UR - https://onlinelibrary.wiley.com/doi/book/10.1002/9781119004721 ER -