000 07302cam a2200913 a 4500
001 ocn827947140
003 OCoLC
005 20240523125535.0
006 m o d
007 cr cnu---unuuu
008 130218s2011 enka ob 001 0 eng d
040 _aN$T
_beng
_epn
_cN$T
_dYDXCP
_dDG1
_dIDEBK
_dE7B
_dOCLCF
_dUMI
_dUKDOC
_dDEBBG
_dEBLCP
_dMHW
_dOCLCQ
_dCOO
_dOCLCQ
_dDG1
_dLIP
_dOCLCQ
_dCEF
_dWYU
_dU3W
_dOCLCQ
_dUAB
_dUKAHL
_dVT2
_dOCLCQ
_dLUU
_dOCLCO
_dOCLCQ
_dOCLCO
_dOCLCL
019 _a827207661
_a878048968
_a878049080
_a878049294
_a878059852
_a900202431
_a992825351
_a1066508869
_a1103268000
_a1141290671
_a1152982820
_a1192345842
_a1240514159
020 _a9781118603390
_q(electronic bk.)
020 _a1118603397
_q(electronic bk.)
020 _a9781118603482
_q(electronic bk.)
020 _a1118603486
_q(electronic bk.)
020 _a9781118603512
020 _a1118603516
020 _z9781848213043
020 _z1848213042
029 1 _aAU@
_b000055873275
029 1 _aCHNEW
_b000599580
029 1 _aCHNEW
_b000941218
029 1 _aCHVBK
_b480214921
029 1 _aDEBBG
_bBV041907976
029 1 _aDEBBG
_bBV042032227
029 1 _aDEBBG
_bBV043395432
029 1 _aDEBSZ
_b414176944
029 1 _aNZ1
_b15915663
035 _a(OCoLC)827947140
_z(OCoLC)827207661
_z(OCoLC)878048968
_z(OCoLC)878049080
_z(OCoLC)878049294
_z(OCoLC)878059852
_z(OCoLC)900202431
_z(OCoLC)992825351
_z(OCoLC)1066508869
_z(OCoLC)1103268000
_z(OCoLC)1141290671
_z(OCoLC)1152982820
_z(OCoLC)1192345842
_z(OCoLC)1240514159
037 _aCL0500000416
_bSafari Books Online
050 4 _aU163
_b.C937 2011eb
072 7 _aHIS
_x027010
_2bisacsh
082 0 4 _a355.3/43
_223
049 _aMAIN
245 0 0 _aCyberwar and information warfare /
_cedited by Daniel Ventre.
260 _aLondon :
_bISTE ;
_aHoboken, NJ :
_bJohn Wiley,
_c2011.
300 _a1 online resource (xix, 412 pages) :
_billustrations
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
490 1 _aISTE
504 _aIncludes bibliographical references and index.
588 0 _aPrint version record.
505 0 _aCover; Cyberwar and Information Warfare; Title Page; Copyright Page; Table of Contents; Introduction; List of Acronyms; Chapter 1. Cyberwar and its Borders; 1.1. The seduction of cyberwar; 1.2. Desirable, vulnerable and frightening information; 1.3. Conflict and its dimensions; 1.4. The Helm and space; 1.5. Between knowledge and violence; 1.6. Space, distance and paths; 1.7. The permanency of war; 1.8. No war without borders; 1.9. The enemy and the sovereign; 1.10. Strengths and weaknesses; 1.11. Bibliography; Chapter 2. War of Meaning, Cyberwar and Democracies; 2.1. Introduction.
505 8 _a2.2. Informational environment, a new operating space for strategy2.2.1. War and information: stakes for the West; 2.2.2. Strategy in the information environment; 2.2.3. Winning the battle of legitimacies; 2.3. Influence strategy: defeating and limiting armed force physical involvement; 2.3.1. Describing the aggressor; 2.3.2. Armed forces and the information environment; 2.3.3. The need for moral force; 2.4. Conclusion; 2.5. Bibliography; Chapter 3. Intelligence, the First Defense? Information Warfare and Strategic Surprise; 3.1. Information warfare, information and war.
505 8 _a3.2. Intelligence and strategic surprise3.2.1. Strategic surprise; 3.2.2. Perception of surprise; 3.2.3. Perception of the possibility of surprise; 3.3. Strategic surprise and information warfare; 3.4. Concluding remarks: surprise in strategic studies; 3.5. Bibliography; Chapter 4. Cyberconflict: Stakes of Power; 4.1. Stakes of power; 4.1.1. Power relations; 4.1.2. Expression of sovereignty; 4.1.3. Cyberpower; 4.1.4. Measuring and locating power; 4.1.5. Limits of exercising power; 4.1.6. The Monroe doctrine; 4.1.7. Globalization; 4.1.8. Shock theories; 4.1.9. Naval and maritime power strategy.
505 8 _a4.1.10. Air/space and cybernetic power: analogies4.1.11. Cyberconflict/cyber weapons, chemical/biological weapons: comparisons; 4.1.12. Cyberconflict/cyber weapons, Cold War, nuclear weapons: comparisons; 4.1.13. Cyberconflict and new wars; 4.2. The Stuxnet affair; 4.3. Bibliography; Chapter 5. Operational Aspects of a Cyberattack: Intelligence, Planning and Conduct; 5.1. Introduction; 5.2. Towards a broader concept of cyberwar; 5.2.1. War and cyberwar: common ground; 5.2.2. New orders in cyberwar; 5.2.3. Who are cyberwarriors?; 5.2.4. Is formalization possible?
505 8 _a5.3. Concept of critical infrastructure5.3.1. Generalized definition of the notion of critical infrastructure; 5.3.2. System interdependence; 5.4. Different phases of a cyberattack; 5.4.1. Intelligence phase; 5.4.2. Planning phase; 5.4.3. Conduct phase; 5.5. A few "elementary building blocks"; 5.5.1. General tactical framework; 5.5.2. Attacks on people; 5.5.3. Opinion manipulation and area control; 5.5.4. Military computer attack in a conventional operation; 5.6. Example scenario; 5.6.1. Tactical scenario; 5.6.2. The order of events; 5.6.3. Analysis; 5.7. Conclusion; 5.8. Bibliography.
520 _aIntegrating empirical, conceptual, and theoretical approaches, this book presents the thinking of researchers and experts in the fields of cybersecurity, cyberdefense, and information warfare. The aim of this book is to analyze the processes of information warfare and cyberwarfare through the historical, operational and strategic perspectives of cyberattacks. Cyberwar and Information Warfare is of extreme use to experts in security studies and intelligence studies, defense universities, ministries of defense and security, and anyone studying political sciences, international relations, g.
590 _aJohn Wiley and Sons
_bWiley Online Library: Complete oBooks
650 0 _aInformation warfare.
650 0 _aPsychological warfare.
650 0 _aComputer crimes.
650 6 _aGuerre de l'information.
650 6 _aGuerre psychologique.
650 6 _aCriminalit�e informatique.
650 7 _aHISTORY
_xMilitary
_xBiological & Chemical Warfare.
_2bisacsh
650 7 _aComputer crimes
_2fast
650 7 _aInformation warfare
_2fast
650 7 _aPsychological warfare
_2fast
700 1 _aVentre, Daniel.
758 _ihas work:
_aCyberwar and information warfare (Text)
_1https://id.oclc.org/worldcat/entity/E39PCFvcfkdBQwxTCGdQX3WJQm
_4https://id.oclc.org/worldcat/ontology/hasWork
776 0 8 _iPrint version:
_tCyberwar and information warfare.
_dLondon : ISTE ; Hoboken, NJ : John Wiley, 2011
_z9781848213043
_w(DLC) 2011024020
_w(OCoLC)729721299
830 0 _aISTE.
856 4 0 _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781118603482
938 _a123Library
_b123L
_n63897
938 _aAskews and Holts Library Services
_bASKH
_nAH24971874
938 _aAskews and Holts Library Services
_bASKH
_nAH24971879
938 _aProQuest Ebook Central
_bEBLB
_nEBL1120650
938 _aebrary
_bEBRY
_nebr10657635
938 _aEBSCOhost
_bEBSC
_n531528
938 _aProQuest MyiLibrary Digital eBook Collection
_bIDEB
_ncis24807266
938 _aYBP Library Services
_bYANK
_n9985054
938 _aYBP Library Services
_bYANK
_n10001759
938 _aYBP Library Services
_bYANK
_n10195989
994 _a92
_bINLUM
999 _c11876
_d11876