03385nam 2200685 450 991013625130332120231107053746.01-119-27734-51-119-00472-11-119-27731-0(CKB)3710000000596070(EBL)4405840(MiAaPQ)EBC4405840(Au-PeEL)EBL4405840(CaPaEBR)ebr11155986(CaONFJC)MIL897667(OCoLC)940438447(PPN)199704716(EXLCZ)99371000000059607020160607h20162016 uy 0engur|n|---|||||rdacontentrdamediardacarrierInformation warfare /Daniel VentreRevised and updated second edition.London, England ;Hoboken, New Jersey :iSTE :Wiley,2016.©20161 online resource (270 p.)Information systems, web and pervasive computing seriesTHEi Wiley ebooksIncludes index.1-84821-660-2 Table of Contents; Title; Copyright; Introduction; 1 The United States; 1.1. Information warfare in the 1990s; 1.2. Information warfare in the 2000s; 1.3. Information warfare in the 2010s; 1.4. Important concepts and reflections; 2 China; 2.1. Significant publications; 2.2. Strategic and doctrinal thinking about information warfare. Genesis; 2.3. Recent policies and strategies on information and cyber security; 2.4. Reflections; 3 Russia; 3.1. Military doctrines and national security strategies; 3.2. Information warfare in practice; 3.3. Comments; 4 Concepts and Theories: Discussions4.1. Doctrines4.2. Information warfare: definitions, models; 4.3. Information warfare or data warfare?; Conclusion; Index; End User License AgreementThis book introduces policy, government, and security professionals to the concept of "information warfare," covering its evolution over the last decade and its developments among such economic and political giants as China, Russia, Japan, India, and Singapore. The text describes various conceptions of information warfare, along with how they function in military, diplomatic, political, and economic contexts. Recent notable cyber attacks are analyzed, the challenges faced by countries who fail to secure their cyberspace (Japan, the US, etc.) are enumerated, and ways to distinguish between cybercrime, cyberwarfare, and cyberterrrorism are discussed.Information systems, web and pervasive computing series.THEi Wiley ebooks.Information warfareBusiness intelligenceTrade secretsInformation technologySecurity measuresComputer securityManagementData protectionInformation warfare.Business intelligence.Trade secrets.Information technologySecurity measures.Computer securityManagement.Data protection.355.343Ventre Daniel847420MiAaPQMiAaPQMiAaPQBOOK9910136251303321Information warfare2013678UNINA