|
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910828680503321 |
|
|
Autore |
Ventre Daniel |
|
|
Titolo |
Information warfare / / Daniel Ventre |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
London, England ; ; Hoboken, New Jersey : , : iSTE : , : Wiley, , 2016 |
|
©2016 |
|
|
|
|
|
|
|
|
|
ISBN |
|
1-119-27734-5 |
1-119-00472-1 |
1-119-27731-0 |
|
|
|
|
|
|
|
|
Edizione |
[Revised and updated second edition.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (270 p.) |
|
|
|
|
|
|
Collana |
|
Information systems, web and pervasive computing series |
THEi Wiley ebooks |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Information warfare |
Business intelligence |
Trade secrets |
Information technology - Security measures |
Computer security - Management |
Data protection |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di contenuto |
|
Table of Contents; Title; Copyright; Introduction; 1 The United States; 1.1. Information warfare in the 1990s; 1.2. Information warfare in the 2000s; 1.3. Information warfare in the 2010s; 1.4. Important concepts and reflections; 2 China; 2.1. Significant publications; 2.2. Strategic and doctrinal thinking about information warfare. Genesis; 2.3. Recent policies and strategies on information and cyber security; 2.4. Reflections; 3 Russia; 3.1. Military doctrines and national security strategies; 3.2. Information warfare in practice; 3.3. Comments; 4 Concepts and Theories: Discussions |
4.1. Doctrines4.2. Information warfare: definitions, models; 4.3. Information warfare or data warfare?; Conclusion; Index; End User License Agreement |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book introduces policy, government, and security professionals to the concept of "information warfare," covering its evolution over the |
|
|
|
|
|
|
|
|
|
|
last decade and its developments among such economic and political giants as China, Russia, Japan, India, and Singapore. The text describes various conceptions of information warfare, along with how they function in military, diplomatic, political, and economic contexts. Recent notable cyber attacks are analyzed, the challenges faced by countries who fail to secure their cyberspace (Japan, the US, etc.) are enumerated, and ways to distinguish between cybercrime, cyberwarfare, and cyberterrrorism are discussed. |
|
|
|
|
|
| |