03469oam 2200649I 450 991045912080332120200520144314.01-136-84218-71-283-04138-397866130413880-203-83328-710.4324/9780203833285 (CKB)2560000000058186(EBL)667886(OCoLC)701718192(SSID)ssj0000473503(PQKBManifestationID)12175556(PQKBTitleCode)TC0000473503(PQKBWorkID)10436741(PQKB)11339408(MiAaPQ)EBC667886(Au-PeEL)EBL667886(CaPaEBR)ebr10447672(CaONFJC)MIL304138(EXLCZ)99256000000005818620180706d2011 uy 0engur|n|---|||||txtccrStrategy in information and influence campaigns how policy advocates, social movements, insurgent groups, corporations, governments, and others get what they want /Jarol B. ManheimNew York :Routledge,2011.1 online resource (338 p.)Description based upon print version of record.0-415-88729-1 0-415-88728-3 Includes bibliographical references and indexes.Book Cover; Title; Copyright; Contents; Figures, Tables, and Boxes; Preface; Acknowledgements; 1 Points of Origin; 2 Information and Influence Campaigns; 3 Strategy and Tactics in Campaign Communication I: Winning the Argument; 4 Strategy and Tactics in Campaign Communication II: Shaping the Decision; 5 Networks and Netwaves: Organizing for Influence; 6 Riding the Waves: Strategy and Tactics in Network Activation; 7 Feeling the Pressure: The Dimensionality of Targets; 8 Guarding the Castle: Deterring, Deflecting, Minimizing or Defeating Information and Influence Campaigns9 Information, and InfluenceAppendix A: Need to Know: Strategic Intelligence and Research in the Campaign; Appendix B: The IIC Knowledge Base: A Selective Bibliographic Inventory; Notes; Appendix C: A Bibliography for IIC Strategy (Including Sources Cited); Author Index; Subject IndexInformation and influence campaigns are a particularly cogent example of the broader phenomenon we now term strategic political communication. If we think of political communication as encompassing the creation, distribution, control, use, processing and effects of information as a political resource, then we can characterize strategic political communication as the purposeful management of such information to achieve a stated objective based on the science of individual, organizational, and governmental decision-making. IICs are more or less centralized, highly structured, systematic, andCommunication in politicsUnited StatesPublic relations and politicsUnited StatesLobbyingUnited StatesElectronic books.Communication in politicsPublic relations and politicsLobbying322.40973Manheim Jarol B.1946-,977592MiAaPQMiAaPQMiAaPQBOOK9910459120803321Strategy in information and influence campaigns2227209UNINA05309nam 22006615 450 99641821460331620210106084816.03-030-45371-510.1007/978-3-030-45371-8(CKB)4100000011223249(MiAaPQ)EBC6177228(DE-He213)978-3-030-45371-8(PPN)243761074(EXLCZ)99410000001122324920200402d2020 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierFoundations and Practice of Security[electronic resource] 12th International Symposium, FPS 2019, Toulouse, France, November 5–7, 2019, Revised Selected Papers /edited by Abdelmalek Benzekri, Michel Barbeau, Guang Gong, Romain Laborde, Joaquin Garcia-Alfaro1st ed. 2020.Cham :Springer International Publishing :Imprint: Springer,2020.1 online resource (415 pages) illustrationsSecurity and Cryptology ;120563-030-45370-7 Machine Learning Approaches -- PAC: Privacy-preserving Arrhythmia Classi cation with neural networks -- Ransomware Network Traffic Analysis for Pre-Encryption Alert -- Using Machine Learning to Detect Anomalies in Embedded Networks in Heavy Vehicles -- Selection and performance analysis of CICIDS2017 features importance -- Semantic Representation Based on Deep Learning for Spam Detection -- Interpreting Machine Learning Malware Detectors Which Leverage N-gram Analysis -- Labelled Network Capture Generation For Anomaly Detection -- Attack Prevention and Trustworthiness -- Lempel-Ziv Compression with Randomized Input-Output for Anti-Compression Side-Channel Attacks under HTTPS/TLS -- Secure Logging with Security against Adaptive Crash Attack -- Enroll, and Authentication will Follow: eID-based Enrollment for a Customized, Secure, and Frictionless Authentication Experience -- TATIS: Trustworthy APIs for Threat Intelligence Sharing with UMA and CP-ABE -- Protecting Android Apps from Repackaging Using Native Code -- Access Control Models and Cryptography -- Command Dependencies in Heuristic Safety Analysis of Access Control Models -- On Attribute Retrieval in ABAC -- Incorporating O -Line Attribute Delegation into Hierarchical Group and Attribute-Based Access Control -- U-EPS: An Ultra-small and Efficient Post-quantum Signature Scheme -- An Efficient Identification Scheme Based on Rank Metric -- Security Analysis of Auctionity: a blockchain based e-auction -- Dynamic Searchable Encryption with Access Control -- Short Papers -- Get-your-ID: Decentralized Proof of Identity -- Towards secure TMIS protocols -- Detecting Ransomware in Encrypted Web Traffic -- Digital forensics in vessel transportation systems -- A Privacy Protection Layer for Wearable Devices -- Validating the DFA Attack Resistance of AES -- A rejection-based approach for detecting SQL injection vulnerabilities in Web applications -- Lightweight IoT Mutual Authentication Scheme based on Transient Identities and Transactions History -- Towards Privacy-Aware Smart Surveillance.This book constitutes the revised selected papers of the 12th International Symposium on Foundations and Practice of Security, FPS 2019, held in Toulouse, France, in November 2019. The 19 full papers and 9 short papers presented in this book were carefully reviewed and selected from 50 submissions. They cover a range of topics such as machine learning approaches; attack prevention and trustworthiness; and access control models and cryptography.Security and Cryptology ;12056Computer securityComputersComputer communication systemsArtificial intelligenceSystems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Information Systems and Communication Servicehttps://scigraph.springernature.com/ontologies/product-market-codes/I18008Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Artificial Intelligencehttps://scigraph.springernature.com/ontologies/product-market-codes/I21000Computer security.Computers.Computer communication systems.Artificial intelligence.Systems and Data Security.Information Systems and Communication Service.Computer Communication Networks.Artificial Intelligence.005.8Benzekri Abdelmalekedthttp://id.loc.gov/vocabulary/relators/edtBarbeau Micheledthttp://id.loc.gov/vocabulary/relators/edtGong Guangedthttp://id.loc.gov/vocabulary/relators/edtLaborde Romainedthttp://id.loc.gov/vocabulary/relators/edtGarcia-Alfaro Joaquinedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK996418214603316Foundations and practice of security1904968UNISA01247cam0-2200421---450 99000479149040332120250529092921.0000479149FED01000479149(Aleph)000479149FED0119990604d1970----km-y0itay50------baitaengITy---a---001yy<<La >>linguistica americana contemporaneaCharles F. HockettEditori Laterza1970172 p.18 cmUniversale Laterza167001000489909LinguisticaStati Uniti d'AmericaStoriaLinguistica410.973Hockett,Charles Francis172633ITUNINARICAUNIMARCBK990004791490403321410.182 HOCK 01 BIS2599 FIL. TEOR.FLFBCFCL 131 (167)Ifcl. 2666FLFBCCA 721Fil. Mod. 17748NAP03410.182 HOCK 01IST.GLOTT. 886FLFBCF.D.i. 0555F.D.i. 555FI1DE FUSCO 20RDF 34DARSTDARSTFLFBCNAP03FI1Linguistica americana contemporanea561813UNINA