LEADER 01118nam0-2200313---450- 001 990009895090403321 005 20140915174906.0 035 $a000989509 035 $aFED01000989509 035 $a(Aleph)000989509FED01 035 $a000989509 100 $a20140915d2008----km-y0itay50------ba 101 0 $aita 102 $aIT 105 $aa-------001yy 200 1 $aGiacomo Leopardi lettore bambino della fisica di Giuseppe Saverio Poli e della poesia dell'Universo$fTatiana Crivelli$gintroduzione di Giuseppe Catenacci$gprefazione di Giuseppe Saverio Poli Jr. 210 $aNapoli$cMuseo di fisica Universitą di Napoli Federico II [etc.]$d2008 215 $a48 p.$cill.$d25 cm 610 0 $aMiscellanea 700 1$aCrivelli,$bTatiana$0176193 702 1$aCatenacci,$bGiuseppe 702 1$aPoli,$bGiuseppe Saverio$c 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990009895090403321 952 $a41-074$bDIPFIS 190$fFI1 959 $aFI1 996 $aGiacomo Leopardi lettore bambino della fisica di Giuseppe Saverio Poli e della poesia dell'Universo$9828923 997 $aUNINA LEADER 05515nam 2200721 a 450 001 9910141487803321 005 20170816123432.0 010 $a1-118-60348-6 010 $a1-299-18789-7 010 $a1-118-60339-7 010 $a1-118-60351-6 035 $a(CKB)2670000000327642 035 $a(EBL)1120650 035 $a(OCoLC)827207661 035 $a(SSID)ssj0000833008 035 $a(PQKBManifestationID)11530843 035 $a(PQKBTitleCode)TC0000833008 035 $a(PQKBWorkID)10935514 035 $a(PQKB)11630910 035 $a(OCoLC)827947140 035 $a(MiAaPQ)EBC1120650 035 $a(CaSebORM)9781118603512 035 $a(EXLCZ)992670000000327642 100 $a20110607d2011 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aCyberwar and information warfare$b[electronic resource] /$fedited by Daniel Ventre 205 $a1st edition 210 $aLondon $cISTE ;$aHoboken, N.J. $cJohn Wiley$d2011 215 $a1 online resource (434 p.) 225 1 $aISTE 300 $aDescription based upon print version of record. 311 $a1-84821-304-2 320 $aIncludes bibliographical references and index. 327 $aCover; Cyberwar and Information Warfare; Title Page; Copyright Page; Table of Contents; Introduction; List of Acronyms; Chapter 1. Cyberwar and its Borders; 1.1. The seduction of cyberwar; 1.2. Desirable, vulnerable and frightening information; 1.3. Conflict and its dimensions; 1.4. The Helm and space; 1.5. Between knowledge and violence; 1.6. Space, distance and paths; 1.7. The permanency of war; 1.8. No war without borders; 1.9. The enemy and the sovereign; 1.10. Strengths and weaknesses; 1.11. Bibliography; Chapter 2. War of Meaning, Cyberwar and Democracies; 2.1. Introduction 327 $a2.2. Informational environment, a new operating space for strategy2.2.1. War and information: stakes for the West; 2.2.2. Strategy in the information environment; 2.2.3. Winning the battle of legitimacies; 2.3. Influence strategy: defeating and limiting armed force physical involvement; 2.3.1. Describing the aggressor; 2.3.2. Armed forces and the information environment; 2.3.3. The need for moral force; 2.4. Conclusion; 2.5. Bibliography; Chapter 3. Intelligence, the First Defense? Information Warfare and Strategic Surprise; 3.1. Information warfare, information and war 327 $a3.2. Intelligence and strategic surprise3.2.1. Strategic surprise; 3.2.2. Perception of surprise; 3.2.3. Perception of the possibility of surprise; 3.3. Strategic surprise and information warfare; 3.4. Concluding remarks: surprise in strategic studies; 3.5. Bibliography; Chapter 4. Cyberconflict: Stakes of Power; 4.1. Stakes of power; 4.1.1. Power relations; 4.1.2. Expression of sovereignty; 4.1.3. Cyberpower; 4.1.4. Measuring and locating power; 4.1.5. Limits of exercising power; 4.1.6. The Monroe doctrine; 4.1.7. Globalization; 4.1.8. Shock theories; 4.1.9. Naval and maritime power strategy 327 $a4.1.10. Air/space and cybernetic power: analogies4.1.11. Cyberconflict/cyber weapons, chemical/biological weapons: comparisons; 4.1.12. Cyberconflict/cyber weapons, Cold War, nuclear weapons: comparisons; 4.1.13. Cyberconflict and new wars; 4.2. The Stuxnet affair; 4.3. Bibliography; Chapter 5. Operational Aspects of a Cyberattack: Intelligence, Planning and Conduct; 5.1. Introduction; 5.2. Towards a broader concept of cyberwar; 5.2.1. War and cyberwar: common ground; 5.2.2. New orders in cyberwar; 5.2.3. Who are cyberwarriors?; 5.2.4. Is formalization possible? 327 $a5.3. Concept of critical infrastructure5.3.1. Generalized definition of the notion of critical infrastructure; 5.3.2. System interdependence; 5.4. Different phases of a cyberattack; 5.4.1. Intelligence phase; 5.4.2. Planning phase; 5.4.3. Conduct phase; 5.5. A few "elementary building blocks"; 5.5.1. General tactical framework; 5.5.2. Attacks on people; 5.5.3. Opinion manipulation and area control; 5.5.4. Military computer attack in a conventional operation; 5.6. Example scenario; 5.6.1. Tactical scenario; 5.6.2. The order of events; 5.6.3. Analysis; 5.7. Conclusion; 5.8. Bibliography 327 $aChapter 6. Riots in Xinjiang and Chinese Information Warfare 330 $aIntegrating empirical, conceptual, and theoretical approaches, this book presents the thinking of researchers and experts in the fields of cybersecurity, cyberdefense, and information warfare.The aim of this book is to analyze the processes of information warfare and cyberwarfare through the historical, operational and strategic perspectives of cyberattacks.Cyberwar and Information Warfare is of extreme use to experts in security studies and intelligence studies, defense universities, ministries of defense and security, and anyone studying political sciences, international relations, g 410 0$aISTE 606 $aInformation warfare 606 $aPsychological warfare 606 $aComputer crimes 608 $aElectronic books. 615 0$aInformation warfare. 615 0$aPsychological warfare. 615 0$aComputer crimes. 676 $a355.3/43 676 $a355.343 700 $aVentre$b Daniel$0847420 701 $aVentre$b Daniel$0847420 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910141487803321 996 $aCyberwar and information warfare$92107721 997 $aUNINA LEADER 01479nam 2200373 n 450 001 996392756503316 005 20200824121735.0 035 $a(CKB)4940000000110461 035 $a(EEBO)2248509549 035 $a(UnM)99866782e 035 $a(UnM)99866782 035 $a(EXLCZ)994940000000110461 100 $a19940420d1658 uy | 101 0 $aeng 135 $aurbn||||a|bb| 200 13$aAn oration of Agrippa to Octavius Cęsar Augustus, against monarchy$b[electronic resource] $eTaken out of the LII. book of Dion the philosopher, Cęlius, S.C. being the interpreter. Printed at Basil after the end of Nichol. Machiavels Prince, anno M.D.XXC. /$fAnd now put into English by A.R 210 $aLondon $cprinted for Livewell Chapman at the Crown in Popes-head-Ally$d1657. [i.e. 1658] 215 $a[2], 10 p 300 $aAnnotation on Thomason copy: "march 3d March. 3"; the 7 in the imprint date has been altered to read "8". 300 $aReproduction of the original in the British Library. 330 $aeebo-0018 606 $aMonarchy$vEarly works to 1800 615 0$aMonarchy 700 $aCassius Dio Cocceianus$0183257 701 $aA. R$01009294 701 $aAgrippa$b Marcus Vipsanius$01009295 801 0$bCu-RivES 801 1$bCu-RivES 801 2$bCStRLIN 801 2$bWaOLN 906 $aBOOK 912 $a996392756503316 996 $aAn oration of Agrippa to Octavius Cęsar Augustus, against monarchy$92330274 997 $aUNISA