000 | 07302cam a2200913 a 4500 | ||
---|---|---|---|
001 | ocn827947140 | ||
003 | OCoLC | ||
005 | 20240523125535.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 130218s2011 enka ob 001 0 eng d | ||
040 |
_aN$T _beng _epn _cN$T _dYDXCP _dDG1 _dIDEBK _dE7B _dOCLCF _dUMI _dUKDOC _dDEBBG _dEBLCP _dMHW _dOCLCQ _dCOO _dOCLCQ _dDG1 _dLIP _dOCLCQ _dCEF _dWYU _dU3W _dOCLCQ _dUAB _dUKAHL _dVT2 _dOCLCQ _dLUU _dOCLCO _dOCLCQ _dOCLCO _dOCLCL |
||
019 |
_a827207661 _a878048968 _a878049080 _a878049294 _a878059852 _a900202431 _a992825351 _a1066508869 _a1103268000 _a1141290671 _a1152982820 _a1192345842 _a1240514159 |
||
020 |
_a9781118603390 _q(electronic bk.) |
||
020 |
_a1118603397 _q(electronic bk.) |
||
020 |
_a9781118603482 _q(electronic bk.) |
||
020 |
_a1118603486 _q(electronic bk.) |
||
020 | _a9781118603512 | ||
020 | _a1118603516 | ||
020 | _z9781848213043 | ||
020 | _z1848213042 | ||
029 | 1 |
_aAU@ _b000055873275 |
|
029 | 1 |
_aCHNEW _b000599580 |
|
029 | 1 |
_aCHNEW _b000941218 |
|
029 | 1 |
_aCHVBK _b480214921 |
|
029 | 1 |
_aDEBBG _bBV041907976 |
|
029 | 1 |
_aDEBBG _bBV042032227 |
|
029 | 1 |
_aDEBBG _bBV043395432 |
|
029 | 1 |
_aDEBSZ _b414176944 |
|
029 | 1 |
_aNZ1 _b15915663 |
|
035 |
_a(OCoLC)827947140 _z(OCoLC)827207661 _z(OCoLC)878048968 _z(OCoLC)878049080 _z(OCoLC)878049294 _z(OCoLC)878059852 _z(OCoLC)900202431 _z(OCoLC)992825351 _z(OCoLC)1066508869 _z(OCoLC)1103268000 _z(OCoLC)1141290671 _z(OCoLC)1152982820 _z(OCoLC)1192345842 _z(OCoLC)1240514159 |
||
037 |
_aCL0500000416 _bSafari Books Online |
||
050 | 4 |
_aU163 _b.C937 2011eb |
|
072 | 7 |
_aHIS _x027010 _2bisacsh |
|
082 | 0 | 4 |
_a355.3/43 _223 |
049 | _aMAIN | ||
245 | 0 | 0 |
_aCyberwar and information warfare / _cedited by Daniel Ventre. |
260 |
_aLondon : _bISTE ; _aHoboken, NJ : _bJohn Wiley, _c2011. |
||
300 |
_a1 online resource (xix, 412 pages) : _billustrations |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
490 | 1 | _aISTE | |
504 | _aIncludes bibliographical references and index. | ||
588 | 0 | _aPrint version record. | |
505 | 0 | _aCover; Cyberwar and Information Warfare; Title Page; Copyright Page; Table of Contents; Introduction; List of Acronyms; Chapter 1. Cyberwar and its Borders; 1.1. The seduction of cyberwar; 1.2. Desirable, vulnerable and frightening information; 1.3. Conflict and its dimensions; 1.4. The Helm and space; 1.5. Between knowledge and violence; 1.6. Space, distance and paths; 1.7. The permanency of war; 1.8. No war without borders; 1.9. The enemy and the sovereign; 1.10. Strengths and weaknesses; 1.11. Bibliography; Chapter 2. War of Meaning, Cyberwar and Democracies; 2.1. Introduction. | |
505 | 8 | _a2.2. Informational environment, a new operating space for strategy2.2.1. War and information: stakes for the West; 2.2.2. Strategy in the information environment; 2.2.3. Winning the battle of legitimacies; 2.3. Influence strategy: defeating and limiting armed force physical involvement; 2.3.1. Describing the aggressor; 2.3.2. Armed forces and the information environment; 2.3.3. The need for moral force; 2.4. Conclusion; 2.5. Bibliography; Chapter 3. Intelligence, the First Defense? Information Warfare and Strategic Surprise; 3.1. Information warfare, information and war. | |
505 | 8 | _a3.2. Intelligence and strategic surprise3.2.1. Strategic surprise; 3.2.2. Perception of surprise; 3.2.3. Perception of the possibility of surprise; 3.3. Strategic surprise and information warfare; 3.4. Concluding remarks: surprise in strategic studies; 3.5. Bibliography; Chapter 4. Cyberconflict: Stakes of Power; 4.1. Stakes of power; 4.1.1. Power relations; 4.1.2. Expression of sovereignty; 4.1.3. Cyberpower; 4.1.4. Measuring and locating power; 4.1.5. Limits of exercising power; 4.1.6. The Monroe doctrine; 4.1.7. Globalization; 4.1.8. Shock theories; 4.1.9. Naval and maritime power strategy. | |
505 | 8 | _a4.1.10. Air/space and cybernetic power: analogies4.1.11. Cyberconflict/cyber weapons, chemical/biological weapons: comparisons; 4.1.12. Cyberconflict/cyber weapons, Cold War, nuclear weapons: comparisons; 4.1.13. Cyberconflict and new wars; 4.2. The Stuxnet affair; 4.3. Bibliography; Chapter 5. Operational Aspects of a Cyberattack: Intelligence, Planning and Conduct; 5.1. Introduction; 5.2. Towards a broader concept of cyberwar; 5.2.1. War and cyberwar: common ground; 5.2.2. New orders in cyberwar; 5.2.3. Who are cyberwarriors?; 5.2.4. Is formalization possible? | |
505 | 8 | _a5.3. Concept of critical infrastructure5.3.1. Generalized definition of the notion of critical infrastructure; 5.3.2. System interdependence; 5.4. Different phases of a cyberattack; 5.4.1. Intelligence phase; 5.4.2. Planning phase; 5.4.3. Conduct phase; 5.5. A few "elementary building blocks"; 5.5.1. General tactical framework; 5.5.2. Attacks on people; 5.5.3. Opinion manipulation and area control; 5.5.4. Military computer attack in a conventional operation; 5.6. Example scenario; 5.6.1. Tactical scenario; 5.6.2. The order of events; 5.6.3. Analysis; 5.7. Conclusion; 5.8. Bibliography. | |
520 | _aIntegrating empirical, conceptual, and theoretical approaches, this book presents the thinking of researchers and experts in the fields of cybersecurity, cyberdefense, and information warfare. The aim of this book is to analyze the processes of information warfare and cyberwarfare through the historical, operational and strategic perspectives of cyberattacks. Cyberwar and Information Warfare is of extreme use to experts in security studies and intelligence studies, defense universities, ministries of defense and security, and anyone studying political sciences, international relations, g. | ||
590 |
_aJohn Wiley and Sons _bWiley Online Library: Complete oBooks |
||
650 | 0 | _aInformation warfare. | |
650 | 0 | _aPsychological warfare. | |
650 | 0 | _aComputer crimes. | |
650 | 6 | _aGuerre de l'information. | |
650 | 6 | _aGuerre psychologique. | |
650 | 6 | _aCriminalit�e informatique. | |
650 | 7 |
_aHISTORY _xMilitary _xBiological & Chemical Warfare. _2bisacsh |
|
650 | 7 |
_aComputer crimes _2fast |
|
650 | 7 |
_aInformation warfare _2fast |
|
650 | 7 |
_aPsychological warfare _2fast |
|
700 | 1 | _aVentre, Daniel. | |
758 |
_ihas work: _aCyberwar and information warfare (Text) _1https://id.oclc.org/worldcat/entity/E39PCFvcfkdBQwxTCGdQX3WJQm _4https://id.oclc.org/worldcat/ontology/hasWork |
||
776 | 0 | 8 |
_iPrint version: _tCyberwar and information warfare. _dLondon : ISTE ; Hoboken, NJ : John Wiley, 2011 _z9781848213043 _w(DLC) 2011024020 _w(OCoLC)729721299 |
830 | 0 | _aISTE. | |
856 | 4 | 0 | _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781118603482 |
938 |
_a123Library _b123L _n63897 |
||
938 |
_aAskews and Holts Library Services _bASKH _nAH24971874 |
||
938 |
_aAskews and Holts Library Services _bASKH _nAH24971879 |
||
938 |
_aProQuest Ebook Central _bEBLB _nEBL1120650 |
||
938 |
_aebrary _bEBRY _nebr10657635 |
||
938 |
_aEBSCOhost _bEBSC _n531528 |
||
938 |
_aProQuest MyiLibrary Digital eBook Collection _bIDEB _ncis24807266 |
||
938 |
_aYBP Library Services _bYANK _n9985054 |
||
938 |
_aYBP Library Services _bYANK _n10001759 |
||
938 |
_aYBP Library Services _bYANK _n10195989 |
||
994 |
_a92 _bINLUM |
||
999 |
_c11876 _d11876 |