03089nam 2200781 a 450 991097401550332120240313114653.09781118381533111838153X978129946486512994648669781118599600111859960897811183815401118381548(CKB)2670000000316632(EBL)1106528(OCoLC)823722243(SSID)ssj0000804024(PQKBManifestationID)11422604(PQKBTitleCode)TC0000804024(PQKBWorkID)10814310(PQKB)10100301(MiAaPQ)EBC1106528(Au-PeEL)EBL1106528(CaPaEBR)ebr10684947(CaONFJC)MIL477736(OCoLC)251207719(FINmELB)ELB177944(Perlego)1014232(EXLCZ)99267000000031663220090708d2009 uy 0engurcn|||||||||txtccrInformation warfare /Daniel Ventre1st ed.London ISTE Ltd. ;Hoboken, N.J. John Wiley & Sonsc20091 online resource (325 p.)ISTEDescription based upon print version of record.9781848210943 1848210949 Includes bibliographical references and index.The United States and information warfare -- China and information warfare -- India and information warfare -- Japan and information warfare -- Russia and information warfare -- Singapore and information warfare -- How to identify aggressors and acts of aggression -- Which law should be used for information warfare?.This book introduces policy, government, and security professionals to the concept of "information warfare," covering its evolution over the last decade and its developments among such economic and political giants as China, Russia, Japan, India, and Singapore. The text describes various conceptions of information warfare, along with how they function in military, diplomatic, political, and economic contexts. Recent notable cyber attacks are analyzed, the challenges faced by countries who fail to secure their cyberspace (Japan, the US, etc.) are enumerated, and ways to distinguish betweenISTEBusiness intelligenceTrade secretsInformation technologySecurity measuresComputer securityManagementData protectionBusiness intelligence.Trade secrets.Information technologySecurity measures.Computer securityManagement.Data protection.355.3/43Ventre Daniel847420MiAaPQMiAaPQMiAaPQBOOK9910974015503321Information warfare2013678UNINA