Artificial intelligence, cybersecurity and cyber defense / / Daniel Ventre |
Autore | Ventre Daniel |
Edizione | [1st edition.] |
Pubbl/distr/stampa | Hoboken, New Jersey : , : ISTE Ltd / John Wiley and Sons Inc, , [2020] |
Descrizione fisica | 1 online resource (267 pages) : illustrations |
Disciplina | 006.3 |
Soggetto topico |
Artificial intelligence
Computer security Computer networks - Security measures |
ISBN |
1-5231-3680-4
1-119-78819-6 1-119-78817-X 1-119-78818-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910555079403321 |
Ventre Daniel | ||
Hoboken, New Jersey : , : ISTE Ltd / John Wiley and Sons Inc, , [2020] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Artificial intelligence, cybersecurity and cyber defense / / Daniel Ventre |
Autore | Ventre Daniel |
Edizione | [1st edition.] |
Pubbl/distr/stampa | Hoboken, New Jersey : , : ISTE Ltd / John Wiley and Sons Inc, , [2020] |
Descrizione fisica | 1 online resource (267 pages) : illustrations |
Disciplina | 006.3 |
Soggetto topico |
Artificial intelligence
Computer security Computer networks - Security measures |
ISBN |
1-5231-3680-4
1-119-78819-6 1-119-78817-X 1-119-78818-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910811705403321 |
Ventre Daniel | ||
Hoboken, New Jersey : , : ISTE Ltd / John Wiley and Sons Inc, , [2020] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber conflict [[electronic resource] ] : competing national perspectives / / edited by Daniel Ventre |
Autore | Ventre Daniel |
Edizione | [1st edition] |
Pubbl/distr/stampa | London, : Iste |
Descrizione fisica | 1 online resource (345 p.) |
Disciplina | 363.325/6004678 |
Altri autori (Persone) | VentreDaniel |
Collana | ISTE |
Soggetto topico |
Internet - Security measures
Cyberspace - Security measures Computer networks - Security measures |
ISBN |
1-118-56266-6
1-118-56274-7 1-118-56296-8 1-299-18890-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Title Page; Copyright Page; Table of Contents; Introduction; Chapter 1. Canada's Cyber Security Policy: a Tortuous Path Toward a Cyber Security Strategy; 1.1. Introduction; 1.2. Canada in North America: sovereign but subordinate?; 1.3. Counter-terrorism for the improvement of national security; 1.4. The long path to a national CI protection strategy and nationalcyber security strategy; 1.5. The adoption of the current strategies for CI protection and cyber security; 1.6. Conclusion; 1.7. Bibliography; 1.7.1. Scientific and media articles; 1.7.2. Primary Data; 1.7.3. Websites
Chapter 2. Cuba: Towards an Active Cyber-defense2.1. Cyberspace: statistics and history; 2.1.1. The marginalization of Cuba; 2.1.2. Cuban cyberspace as the target of attacks; 2.2. Theoretical and practical considerations on information warfareand cyber-warfare; 2.2.1. Development of capabilities; 2.3. Cyber-warfare theories and practices; 2.3.1. Fidel Castro's discourse; 2.3.2. The concept of active cyber-defense; 2.4. Regulations and ways around them; 2.4.1. The State's influence over cyberspace; 2.4.2. Getting around the restrictions 2.5. Capabilities of control, surveillance and interception2.6. Enemies; 2.7. Conclusion; 2.8. Bibliography; Chapter 3. French Perspectives on Cyber-conflict; 3.1. Cyberspace; 3.2. Assessments, view on the world and awakening; 3.2.1. Attacks; 3.2.2. The feeling of insecurity, the threat; 3.2.3. Potential vulnerabilities of States; 3.2.4. Evolution of the international environment; 3.3. Reaction, position of France and choice: theories, political strategies and military doctrines; 3.3.1. Information: a powerful weapon for those controlling it; 3.3.2. Media information: beneficial if controlled 3.3.3. Economic information as power, if controlled3.3.4. Information warfare; 3.3.5. Information warfare or information control; 3.3.6. The ANSSI; 3.3.7. Cyber-security and cyber-defense; 3.3.8. Army: Information operations, NEB (numérisation de l'espace de bataille/digitization of battlespace), info-development; 3.3.9. Cyber-war and other modalities of the cyber-conflict; 3.4. Conclusion; 3.5. Bibliography; Chapter 4. Digital Sparta: Information Operationsand Cyber-warfare in Greece; 4.1. Geopolitical significance; 4.2. Strategic concerns and internal balancing 4.3. Formative experiences in information operations: the Ergenekon conspiracy4.4. Formative experiences in information operations:intensifying cyber-attacks; 4.5. Formative experiences in information operations: the Öcalan affair; 4.6. Formative experiences in information operations: the Greek wiretapping case of 2004-2005; 4.7. Emerging civilian information operations strategies; 4.8. Emerging military information operations strategies; 4.9. The European Union dimension in Greek information operations; 4.10. Conclusion; 4.11. Bibliography Chapter 5. Moving Toward an Italian Cyber Defenseand Security Strategy |
Record Nr. | UNINA-9910138856703321 |
Ventre Daniel | ||
London, : Iste | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber conflict : competing national perspectives / / edited by Daniel Ventre |
Autore | Ventre Daniel |
Edizione | [1st edition] |
Pubbl/distr/stampa | London, : Iste |
Descrizione fisica | 1 online resource (345 p.) |
Disciplina | 363.325/6004678 |
Altri autori (Persone) | VentreDaniel |
Collana | ISTE |
Soggetto topico |
Internet - Security measures
Cyberspace - Security measures Computer networks - Security measures |
ISBN |
1-118-56266-6
1-118-56274-7 1-118-56296-8 1-299-18890-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Title Page; Copyright Page; Table of Contents; Introduction; Chapter 1. Canada's Cyber Security Policy: a Tortuous Path Toward a Cyber Security Strategy; 1.1. Introduction; 1.2. Canada in North America: sovereign but subordinate?; 1.3. Counter-terrorism for the improvement of national security; 1.4. The long path to a national CI protection strategy and nationalcyber security strategy; 1.5. The adoption of the current strategies for CI protection and cyber security; 1.6. Conclusion; 1.7. Bibliography; 1.7.1. Scientific and media articles; 1.7.2. Primary Data; 1.7.3. Websites
Chapter 2. Cuba: Towards an Active Cyber-defense2.1. Cyberspace: statistics and history; 2.1.1. The marginalization of Cuba; 2.1.2. Cuban cyberspace as the target of attacks; 2.2. Theoretical and practical considerations on information warfareand cyber-warfare; 2.2.1. Development of capabilities; 2.3. Cyber-warfare theories and practices; 2.3.1. Fidel Castro's discourse; 2.3.2. The concept of active cyber-defense; 2.4. Regulations and ways around them; 2.4.1. The State's influence over cyberspace; 2.4.2. Getting around the restrictions 2.5. Capabilities of control, surveillance and interception2.6. Enemies; 2.7. Conclusion; 2.8. Bibliography; Chapter 3. French Perspectives on Cyber-conflict; 3.1. Cyberspace; 3.2. Assessments, view on the world and awakening; 3.2.1. Attacks; 3.2.2. The feeling of insecurity, the threat; 3.2.3. Potential vulnerabilities of States; 3.2.4. Evolution of the international environment; 3.3. Reaction, position of France and choice: theories, political strategies and military doctrines; 3.3.1. Information: a powerful weapon for those controlling it; 3.3.2. Media information: beneficial if controlled 3.3.3. Economic information as power, if controlled3.3.4. Information warfare; 3.3.5. Information warfare or information control; 3.3.6. The ANSSI; 3.3.7. Cyber-security and cyber-defense; 3.3.8. Army: Information operations, NEB (numérisation de l'espace de bataille/digitization of battlespace), info-development; 3.3.9. Cyber-war and other modalities of the cyber-conflict; 3.4. Conclusion; 3.5. Bibliography; Chapter 4. Digital Sparta: Information Operationsand Cyber-warfare in Greece; 4.1. Geopolitical significance; 4.2. Strategic concerns and internal balancing 4.3. Formative experiences in information operations: the Ergenekon conspiracy4.4. Formative experiences in information operations:intensifying cyber-attacks; 4.5. Formative experiences in information operations: the Öcalan affair; 4.6. Formative experiences in information operations: the Greek wiretapping case of 2004-2005; 4.7. Emerging civilian information operations strategies; 4.8. Emerging military information operations strategies; 4.9. The European Union dimension in Greek information operations; 4.10. Conclusion; 4.11. Bibliography Chapter 5. Moving Toward an Italian Cyber Defenseand Security Strategy |
Record Nr. | UNINA-9910820094103321 |
Ventre Daniel | ||
London, : Iste | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyberwar and information warfare [[electronic resource] /] / edited by Daniel Ventre |
Autore | Ventre Daniel |
Edizione | [1st edition] |
Pubbl/distr/stampa | London, : ISTE |
Descrizione fisica | 1 online resource (434 p.) |
Disciplina |
355.3/43
355.343 |
Altri autori (Persone) | VentreDaniel |
Collana | ISTE |
Soggetto topico |
Information warfare
Psychological warfare Computer crimes |
Soggetto genere / forma | Electronic books. |
ISBN |
1-118-60348-6
1-299-18789-7 1-118-60339-7 1-118-60351-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Cyberwar and Information Warfare; Title Page; Copyright Page; Table of Contents; Introduction; List of Acronyms; Chapter 1. Cyberwar and its Borders; 1.1. The seduction of cyberwar; 1.2. Desirable, vulnerable and frightening information; 1.3. Conflict and its dimensions; 1.4. The Helm and space; 1.5. Between knowledge and violence; 1.6. Space, distance and paths; 1.7. The permanency of war; 1.8. No war without borders; 1.9. The enemy and the sovereign; 1.10. Strengths and weaknesses; 1.11. Bibliography; Chapter 2. War of Meaning, Cyberwar and Democracies; 2.1. Introduction
2.2. Informational environment, a new operating space for strategy2.2.1. War and information: stakes for the West; 2.2.2. Strategy in the information environment; 2.2.3. Winning the battle of legitimacies; 2.3. Influence strategy: defeating and limiting armed force physical involvement; 2.3.1. Describing the aggressor; 2.3.2. Armed forces and the information environment; 2.3.3. The need for moral force; 2.4. Conclusion; 2.5. Bibliography; Chapter 3. Intelligence, the First Defense? Information Warfare and Strategic Surprise; 3.1. Information warfare, information and war 3.2. Intelligence and strategic surprise3.2.1. Strategic surprise; 3.2.2. Perception of surprise; 3.2.3. Perception of the possibility of surprise; 3.3. Strategic surprise and information warfare; 3.4. Concluding remarks: surprise in strategic studies; 3.5. Bibliography; Chapter 4. Cyberconflict: Stakes of Power; 4.1. Stakes of power; 4.1.1. Power relations; 4.1.2. Expression of sovereignty; 4.1.3. Cyberpower; 4.1.4. Measuring and locating power; 4.1.5. Limits of exercising power; 4.1.6. The Monroe doctrine; 4.1.7. Globalization; 4.1.8. Shock theories; 4.1.9. Naval and maritime power strategy 4.1.10. Air/space and cybernetic power: analogies4.1.11. Cyberconflict/cyber weapons, chemical/biological weapons: comparisons; 4.1.12. Cyberconflict/cyber weapons, Cold War, nuclear weapons: comparisons; 4.1.13. Cyberconflict and new wars; 4.2. The Stuxnet affair; 4.3. Bibliography; Chapter 5. Operational Aspects of a Cyberattack: Intelligence, Planning and Conduct; 5.1. Introduction; 5.2. Towards a broader concept of cyberwar; 5.2.1. War and cyberwar: common ground; 5.2.2. New orders in cyberwar; 5.2.3. Who are cyberwarriors?; 5.2.4. Is formalization possible? 5.3. Concept of critical infrastructure5.3.1. Generalized definition of the notion of critical infrastructure; 5.3.2. System interdependence; 5.4. Different phases of a cyberattack; 5.4.1. Intelligence phase; 5.4.2. Planning phase; 5.4.3. Conduct phase; 5.5. A few "elementary building blocks"; 5.5.1. General tactical framework; 5.5.2. Attacks on people; 5.5.3. Opinion manipulation and area control; 5.5.4. Military computer attack in a conventional operation; 5.6. Example scenario; 5.6.1. Tactical scenario; 5.6.2. The order of events; 5.6.3. Analysis; 5.7. Conclusion; 5.8. Bibliography Chapter 6. Riots in Xinjiang and Chinese Information Warfare |
Record Nr. | UNINA-9910141487803321 |
Ventre Daniel | ||
London, : ISTE | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyberwar and information warfare [[electronic resource] /] / edited by Daniel Ventre |
Autore | Ventre Daniel |
Edizione | [1st edition] |
Pubbl/distr/stampa | London, : ISTE |
Descrizione fisica | 1 online resource (434 p.) |
Disciplina |
355.3/43
355.343 |
Altri autori (Persone) | VentreDaniel |
Collana | ISTE |
Soggetto topico |
Information warfare
Psychological warfare Computer crimes |
ISBN |
1-118-60348-6
1-299-18789-7 1-118-60339-7 1-118-60351-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Cyberwar and Information Warfare; Title Page; Copyright Page; Table of Contents; Introduction; List of Acronyms; Chapter 1. Cyberwar and its Borders; 1.1. The seduction of cyberwar; 1.2. Desirable, vulnerable and frightening information; 1.3. Conflict and its dimensions; 1.4. The Helm and space; 1.5. Between knowledge and violence; 1.6. Space, distance and paths; 1.7. The permanency of war; 1.8. No war without borders; 1.9. The enemy and the sovereign; 1.10. Strengths and weaknesses; 1.11. Bibliography; Chapter 2. War of Meaning, Cyberwar and Democracies; 2.1. Introduction
2.2. Informational environment, a new operating space for strategy2.2.1. War and information: stakes for the West; 2.2.2. Strategy in the information environment; 2.2.3. Winning the battle of legitimacies; 2.3. Influence strategy: defeating and limiting armed force physical involvement; 2.3.1. Describing the aggressor; 2.3.2. Armed forces and the information environment; 2.3.3. The need for moral force; 2.4. Conclusion; 2.5. Bibliography; Chapter 3. Intelligence, the First Defense? Information Warfare and Strategic Surprise; 3.1. Information warfare, information and war 3.2. Intelligence and strategic surprise3.2.1. Strategic surprise; 3.2.2. Perception of surprise; 3.2.3. Perception of the possibility of surprise; 3.3. Strategic surprise and information warfare; 3.4. Concluding remarks: surprise in strategic studies; 3.5. Bibliography; Chapter 4. Cyberconflict: Stakes of Power; 4.1. Stakes of power; 4.1.1. Power relations; 4.1.2. Expression of sovereignty; 4.1.3. Cyberpower; 4.1.4. Measuring and locating power; 4.1.5. Limits of exercising power; 4.1.6. The Monroe doctrine; 4.1.7. Globalization; 4.1.8. Shock theories; 4.1.9. Naval and maritime power strategy 4.1.10. Air/space and cybernetic power: analogies4.1.11. Cyberconflict/cyber weapons, chemical/biological weapons: comparisons; 4.1.12. Cyberconflict/cyber weapons, Cold War, nuclear weapons: comparisons; 4.1.13. Cyberconflict and new wars; 4.2. The Stuxnet affair; 4.3. Bibliography; Chapter 5. Operational Aspects of a Cyberattack: Intelligence, Planning and Conduct; 5.1. Introduction; 5.2. Towards a broader concept of cyberwar; 5.2.1. War and cyberwar: common ground; 5.2.2. New orders in cyberwar; 5.2.3. Who are cyberwarriors?; 5.2.4. Is formalization possible? 5.3. Concept of critical infrastructure5.3.1. Generalized definition of the notion of critical infrastructure; 5.3.2. System interdependence; 5.4. Different phases of a cyberattack; 5.4.1. Intelligence phase; 5.4.2. Planning phase; 5.4.3. Conduct phase; 5.5. A few "elementary building blocks"; 5.5.1. General tactical framework; 5.5.2. Attacks on people; 5.5.3. Opinion manipulation and area control; 5.5.4. Military computer attack in a conventional operation; 5.6. Example scenario; 5.6.1. Tactical scenario; 5.6.2. The order of events; 5.6.3. Analysis; 5.7. Conclusion; 5.8. Bibliography Chapter 6. Riots in Xinjiang and Chinese Information Warfare |
Record Nr. | UNINA-9910830507403321 |
Ventre Daniel | ||
London, : ISTE | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Electronic communication interception technologies and issues of power / / Daniel Ventre and Philippe Guillot |
Autore | Ventre Daniel |
Edizione | [1st ed.] |
Pubbl/distr/stampa | London, England ; Hoboken, NJ : , : ISTE Ltd : , : John Wiley & Sons, Inc., , [2023] |
Descrizione fisica | 1 online resource (259 pages) |
Disciplina | 929.605 |
Soggetto topico | Computers |
ISBN |
1-394-23672-7
1-394-23670-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover -- Title Page -- Copyright Page -- Contents -- Introduction -- Chapter 1. History and Repertoire of Communication Interception Practices -- 1.1. Military interceptions during the war -- 1.1.1. The interception of telegraphic communications -- 1.1.2. The interception of radio communications -- 1.1.3. Telephone interception -- 1.1.4. The use of SIGINT capabilities -- 1.1.5. Wartime interceptions in cyberspace -- 1.1.6. Drones and interceptions -- 1.2. The interception of international communications: espionage, surveillance, war -- 1.2.1. The interception of telegrams -- 1.2.2. Espionage during the Cold War: satellite, radio, telephone interceptions -- 1.2.3. The interception of international communications: the Echelon program -- 1.2.4. Bulk cyber surveillance -- 1.2.5. Foreign companies in national telecommunication infrastructures -- 1.2.6. Actions over undersea Internet cables -- 1.2.7. Interceptions in planes and airports -- 1.2.8. International interceptions as a product of secret alliances -- 1.3. Interception of diplomatic correspondence -- 1.4. Political surveillance: targeted and bulk interceptions -- 1.4.1. Interception of correspondence -- 1.4.2. Bulk domestic surveillance in East Germany -- 1.4.3. Cyber surveillance in Russia: the SORM system -- 1.4.4. Fixed and mobile telephone tapping -- 1.4.5. The interception of electronic communications in the political sphere -- 1.5. Criminal interceptions -- 1.6. Police, justice: the fight against crime, lawful interceptions -- 1.7. On the usefulness and effectiveness of interceptions -- Chapter 2. The Central Issue of Encryption -- 2.1. The capabilities required for interceptions -- 2.1.1. Material, technological capabilities -- 2.1.2. Human resources -- 2.2. Protecting yourself against the threat of interceptions: encryption -- 2.2.1. The public key revolution.
2.2.2. Advances in factorization -- 2.2.3. Shor's quantum algorithm -- 2.2.4. The evolution of computing capabilities -- 2.2.5. The evolution of etching precision -- 2.3. Attacking encrypted communications, circumventing the hurdle of encryption -- 2.3.1. Interceptions on encrypted messaging -- 2.3.2. The attacks against keys and PKIs -- 2.3.3. The use of backdoors -- Chapter 3. Power Struggles -- 3.1. State pressure on the industry: cooperation or coercion logics? -- 3.2. The accounts of whistleblowers and their analyses of the balance of power between the state, the citizen and companies -- 3.2.1. The account of Herbert O. Yardley -- 3.2.2. The account of Perry Fellwock (also known as Winslow Peck) -- 3.2.3. The account of Mark Klein -- 3.2.4. The account of James Bamford -- 3.2.5. The account of Babak Pasdar -- 3.2.6. The account of Joseph Nacchio -- 3.2.7. The account of Edward Snowden -- 3.2.8. The account of Julian Assange -- 3.3. Limits imposed on the state's power to control technology -- 3.3.1. The difficult and fragile international regulation of technologies -- 3.3.2. Illicit markets and the circumvention of laws -- 3.4. Trust -- 3.4.1. How much confidence in encryption? -- 3.4.2. The acceleration of calculations as a factor of confidence -- 3.4.3. Abandoning secret methods -- 3.4.4. Provable security -- 3.4.5. The worlds of Impagliazzo -- 3.4.6. The contribution of quantum computing -- 3.5. Conclusion -- 3.5.1. Technologies -- 3.5.2. Actors -- 3.5.3. Interactions or relationships -- Appendices -- References -- Index -- EULA. |
Record Nr. | UNINA-9910830906003321 |
Ventre Daniel | ||
London, England ; Hoboken, NJ : , : ISTE Ltd : , : John Wiley & Sons, Inc., , [2023] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information warfare / / Daniel Ventre |
Autore | Ventre Daniel |
Edizione | [Revised and updated second edition.] |
Pubbl/distr/stampa | London, England ; ; Hoboken, New Jersey : , : iSTE : , : Wiley, , 2016 |
Descrizione fisica | 1 online resource (270 p.) |
Disciplina | 355.343 |
Collana |
Information systems, web and pervasive computing series
THEi Wiley ebooks |
Soggetto topico |
Information warfare
Business intelligence Trade secrets Information technology - Security measures Computer security - Management Data protection |
ISBN |
1-119-27734-5
1-119-00472-1 1-119-27731-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Table of Contents; Title; Copyright; Introduction; 1 The United States; 1.1. Information warfare in the 1990s; 1.2. Information warfare in the 2000s; 1.3. Information warfare in the 2010s; 1.4. Important concepts and reflections; 2 China; 2.1. Significant publications; 2.2. Strategic and doctrinal thinking about information warfare. Genesis; 2.3. Recent policies and strategies on information and cyber security; 2.4. Reflections; 3 Russia; 3.1. Military doctrines and national security strategies; 3.2. Information warfare in practice; 3.3. Comments; 4 Concepts and Theories: Discussions
4.1. Doctrines4.2. Information warfare: definitions, models; 4.3. Information warfare or data warfare?; Conclusion; Index; End User License Agreement |
Record Nr. | UNINA-9910136251303321 |
Ventre Daniel | ||
London, England ; ; Hoboken, New Jersey : , : iSTE : , : Wiley, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information warfare / / Daniel Ventre |
Autore | Ventre Daniel |
Edizione | [Revised and updated second edition.] |
Pubbl/distr/stampa | London, England ; ; Hoboken, New Jersey : , : iSTE : , : Wiley, , 2016 |
Descrizione fisica | 1 online resource (270 p.) |
Disciplina | 355.343 |
Collana |
Information systems, web and pervasive computing series
THEi Wiley ebooks |
Soggetto topico |
Information warfare
Business intelligence Trade secrets Information technology - Security measures Computer security - Management Data protection |
ISBN |
1-119-27734-5
1-119-00472-1 1-119-27731-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Table of Contents; Title; Copyright; Introduction; 1 The United States; 1.1. Information warfare in the 1990s; 1.2. Information warfare in the 2000s; 1.3. Information warfare in the 2010s; 1.4. Important concepts and reflections; 2 China; 2.1. Significant publications; 2.2. Strategic and doctrinal thinking about information warfare. Genesis; 2.3. Recent policies and strategies on information and cyber security; 2.4. Reflections; 3 Russia; 3.1. Military doctrines and national security strategies; 3.2. Information warfare in practice; 3.3. Comments; 4 Concepts and Theories: Discussions
4.1. Doctrines4.2. Information warfare: definitions, models; 4.3. Information warfare or data warfare?; Conclusion; Index; End User License Agreement |
Record Nr. | UNINA-9910828680503321 |
Ventre Daniel | ||
London, England ; ; Hoboken, New Jersey : , : iSTE : , : Wiley, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information warfare [[electronic resource] /] / Daniel Ventre |
Autore | Ventre Daniel |
Pubbl/distr/stampa | London, : ISTE Ltd. |
Descrizione fisica | 1 online resource (325 p.) |
Disciplina | 355.3/43 |
Collana | ISTE |
Soggetto topico |
Business intelligence
Trade secrets Information technology - Security measures Computer security - Management Data protection |
ISBN |
1-118-38153-X
1-299-46486-6 1-118-59960-8 1-118-38154-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | The United States and information warfare -- China and information warfare -- India and information warfare -- Japan and information warfare -- Russia and information warfare -- Singapore and information warfare -- How to identify aggressors and acts of aggression -- Which law should be used for information warfare?. |
Record Nr. | UNINA-9910786096803321 |
Ventre Daniel | ||
London, : ISTE Ltd. | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|