LEADER 03089nam 2200781 a 450 001 9910974015503321 005 20240313114653.0 010 $a9781118381533 010 $a111838153X 010 $a9781299464865 010 $a1299464866 010 $a9781118599600 010 $a1118599608 010 $a9781118381540 010 $a1118381548 035 $a(CKB)2670000000316632 035 $a(EBL)1106528 035 $a(OCoLC)823722243 035 $a(SSID)ssj0000804024 035 $a(PQKBManifestationID)11422604 035 $a(PQKBTitleCode)TC0000804024 035 $a(PQKBWorkID)10814310 035 $a(PQKB)10100301 035 $a(MiAaPQ)EBC1106528 035 $a(Au-PeEL)EBL1106528 035 $a(CaPaEBR)ebr10684947 035 $a(CaONFJC)MIL477736 035 $a(OCoLC)251207719 035 $a(FINmELB)ELB177944 035 $a(Perlego)1014232 035 $a(EXLCZ)992670000000316632 100 $a20090708d2009 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 10$aInformation warfare /$fDaniel Ventre 205 $a1st ed. 210 $aLondon $cISTE Ltd. ;$aHoboken, N.J. $cJohn Wiley & Sons$dc2009 215 $a1 online resource (325 p.) 225 1 $aISTE 300 $aDescription based upon print version of record. 311 08$a9781848210943 311 08$a1848210949 320 $aIncludes bibliographical references and index. 327 $aThe United States and information warfare -- China and information warfare -- India and information warfare -- Japan and information warfare -- Russia and information warfare -- Singapore and information warfare -- How to identify aggressors and acts of aggression -- Which law should be used for information warfare?. 330 $aThis book introduces policy, government, and security professionals to the concept of "information warfare," covering its evolution over the last decade and its developments among such economic and political giants as China, Russia, Japan, India, and Singapore. The text describes various conceptions of information warfare, along with how they function in military, diplomatic, political, and economic contexts. Recent notable cyber attacks are analyzed, the challenges faced by countries who fail to secure their cyberspace (Japan, the US, etc.) are enumerated, and ways to distinguish between 410 0$aISTE 606 $aBusiness intelligence 606 $aTrade secrets 606 $aInformation technology$xSecurity measures 606 $aComputer security$xManagement 606 $aData protection 615 0$aBusiness intelligence. 615 0$aTrade secrets. 615 0$aInformation technology$xSecurity measures. 615 0$aComputer security$xManagement. 615 0$aData protection. 676 $a355.3/43 700 $aVentre$b Daniel$0847420 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910974015503321 996 $aInformation warfare$92013678 997 $aUNINA