00927nam0 2200277 450 00001786620081020172709.020081020d1994----km-y0itay50------baitaITy-------001yy<<L' >>archivio della SorimaCarlo de RisioRomaRivista marittima199492 p.ill.25 cm<<[>>Supplemento alla Rivista marittima<<]>>Descrizione basata sulla cop.2001<<[>>Supplemento alla Rivista marittima<<]>>NaviRecupero1926-1960Societa ricuperi marittimi1926-1960623.8885090421Tecnica della navigazioneDe Risio,Carlo0709392ITUNIPARTHENOPE20081020RICAUNIMARC000017866RIMAS 623/7-1994s.i.PIST2008Archivio della Sorima120186UNIPARTHENOPE01166nam0 22002651i 450 UON0005456720231205102241.3820020107d1926 |0itac50 bafreFR|||| 1||||La conquete des Etats nestoriens de l'Asie centrale par les Schiitesles influences chrètienne et bouddhique dans le dogme islamiqueE. BlochetParis : Librarie Auguste Picard19263-131 pp.23 cmExtrait de la revue de l'Orient Chretien, 3 série, T.V. (XXV), n°1 et 2 (1925-26)FRParisUONL002984ARA IVPAESI ARABI - STORIAABLOCHETEdgarUONV012193640939Librairie Auguste PicardUONV254589650ITSOL20240220RICASIBA - SISTEMA BIBLIOTECARIO DI ATENEOUONSIUON00054567SIBA - SISTEMA BIBLIOTECARIO DI ATENEOSI ARA IV 182 SI MR 24035 5 182 Conquete des Etats nestoriens de l'Asie centrale par les Schiites1151033UNIOR03229nam 2200613 450 991081981440332120230124193614.00-8203-4919-4(CKB)3710000000633009(EBL)4471218(SSID)ssj0001647007(PQKBManifestationID)16417188(PQKBTitleCode)TC0001647007(PQKBWorkID)14828603(PQKB)10098042(MiAaPQ)EBC4471218(OCoLC)946106119(MdBmJHUP)muse53024(Au-PeEL)EBL4471218(CaPaEBR)ebr11206803(CaONFJC)MIL909496(OCoLC)946312777(EXLCZ)99371000000063300920150904d2016 uy| 0engur|n|---|||||txtccrThe decision to attack military and intelligence cyber decision-making /Aaron Franklin BrantlyAthens, Georgia :University of Georgia Press,[2016]1 online resource (245 p.)Studies in security and international affairsDescription based upon print version of record.0-8203-4920-8 Includes bibliographical references and index.Introduction to cyber decision-making -- The key concepts of cyber -- The motivation and utility for covert action -- Digital power -- Anonymity and attribution in cyberspace -- Cyber and conventional operations: the dynamics of conflict -- Defining the role of intelligence in cyberspace -- How actors decide to use cyber--a rational choice approach -- Cognitive processes and decision-making in cyberspace -- Finding meaning in the expected utility of international cyber conflict -- Appendix A. Power score components and scores -- Appendix B. Modified Economist Intelligence Unit component values -- Appendix C. Affinity scores.The debate over cyber technology has resulted in new considerations for national security operations. States find themselves in an increasingly interconnected world with a diverse threat spectrum and little understanding of how decisions are made within this amorphous domain.<BR><BR>With<i> The Decision to Attack</i>, Aaron Franklin Brantly investigates how states decide to employ cyber in military and intelligence operations against other states and how rational those decisions are. In his examination, Brantly contextualizes broader cyber decision-making processes into a systematic expected uStudies in security and international affairs.Military and intelligence cyber decision-makingCyberspaceSecurity measuresGovernment policyUnited StatesOffensive (Military science)United StatesMilitary policyDecision makingCyberspaceSecurity measuresGovernment policyOffensive (Military science)355.4/1Brantly Aaron Franklin788423MiAaPQMiAaPQMiAaPQBOOK9910819814403321The decision to attack4055665UNINA