LEADER 03385nam 2200685 450 001 9910136251303321 005 20231107053746.0 010 $a1-119-27734-5 010 $a1-119-00472-1 010 $a1-119-27731-0 035 $a(CKB)3710000000596070 035 $a(EBL)4405840 035 $a(MiAaPQ)EBC4405840 035 $a(Au-PeEL)EBL4405840 035 $a(CaPaEBR)ebr11155986 035 $a(CaONFJC)MIL897667 035 $a(OCoLC)940438447 035 $a(PPN)199704716 035 $a(EXLCZ)993710000000596070 100 $a20160607h20162016 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 10$aInformation warfare /$fDaniel Ventre 205 $aRevised and updated second edition. 210 1$aLondon, England ;$aHoboken, New Jersey :$ciSTE :$cWiley,$d2016. 210 4$dİ2016 215 $a1 online resource (270 p.) 225 1 $aInformation systems, web and pervasive computing series 225 1 $aTHEi Wiley ebooks 300 $aIncludes index. 311 $a1-84821-660-2 327 $aTable of Contents; Title; Copyright; Introduction; 1 The United States; 1.1. Information warfare in the 1990s; 1.2. Information warfare in the 2000s; 1.3. Information warfare in the 2010s; 1.4. Important concepts and reflections; 2 China; 2.1. Significant publications; 2.2. Strategic and doctrinal thinking about information warfare. Genesis; 2.3. Recent policies and strategies on information and cyber security; 2.4. Reflections; 3 Russia; 3.1. Military doctrines and national security strategies; 3.2. Information warfare in practice; 3.3. Comments; 4 Concepts and Theories: Discussions 327 $a4.1. Doctrines4.2. Information warfare: definitions, models; 4.3. Information warfare or data warfare?; Conclusion; Index; End User License Agreement 330 1 $aThis book introduces policy, government, and security professionals to the concept of "information warfare," covering its evolution over the last decade and its developments among such economic and political giants as China, Russia, Japan, India, and Singapore. The text describes various conceptions of information warfare, along with how they function in military, diplomatic, political, and economic contexts. Recent notable cyber attacks are analyzed, the challenges faced by countries who fail to secure their cyberspace (Japan, the US, etc.) are enumerated, and ways to distinguish between cybercrime, cyberwarfare, and cyberterrrorism are discussed. 410 0$aInformation systems, web and pervasive computing series. 410 0$aTHEi Wiley ebooks. 606 $aInformation warfare 606 $aBusiness intelligence 606 $aTrade secrets 606 $aInformation technology$xSecurity measures 606 $aComputer security$xManagement 606 $aData protection 615 0$aInformation warfare. 615 0$aBusiness intelligence. 615 0$aTrade secrets. 615 0$aInformation technology$xSecurity measures. 615 0$aComputer security$xManagement. 615 0$aData protection. 676 $a355.343 700 $aVentre$b Daniel$0847420 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910136251303321 996 $aInformation warfare$92013678 997 $aUNINA