top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Chinese cybersecurity and defense / / edited by Daniel Ventre
Chinese cybersecurity and defense / / edited by Daniel Ventre
Pubbl/distr/stampa London, [England] ; ; Hoboken, New Jersey : , : ISTE : , : Wiley, , 2014
Descrizione fisica 1 online resource (321 p.)
Disciplina 005.8
Collana ISTE
Soggetto topico Computer security
Internet - Security measures
ISBN 1-119-00900-6
1-119-00901-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright; Contents; Author Biographies; Introduction; Chapter 1: China's Internet Development and Cyber security - Policies and Practices; 1.1. Introduction; 1.2. Internet development in China: an overview; 1.3. China's policies towards Internet development; 1.3.1. From the very beginning of its development,China's Internet has been closely linked to the Chinese economy, and was programmed and integrated into its macro economic development blueprints
1.3.2. In addition to lending full policy support to Internet development, China also invests heavily in building Internet infrastructures 1.3.3. The Chinese government actively promotes the R&D of next-generation Internet (NGI); 1.3.4. China practices a policy of managing cyber affairs in line with law, adhering to the principles of scientific and effective administration in its Internet governance; 1.4. Cyber legislation and Internet administration; 1.4.1. Basic principles and practices of Internet administration in China; 1.4.1.1. Laws and regulations on Internet administration
1.4.1.2. The leading role of the Chinese government in Internet administration 1.4.1.3. Industry self-regulation; 1.4.1.4. Public supervision through special websites; 1.4.2. Guaranteeing the free and secure flow of information in cyberspace; 1.4.2.1. Guaranteeing Citizens' Freedom of Speech on the Internet; 1.4.2.1.1. Constitutional guarantee; 1.4.2.1.2. Public supervision via the Internet; 1.4.2.1.3. CCDI website for public supervision; 1.4.2.1.4. Protecting citizens' online privacy; 1.4.2.1.5. Guaranteeing online safety for minors; 1.4.2.2. Protecting Internet Security
1.5. Cyber security and diplomacy: an international perspective 1.5.1. Cyber policy dialogue and consultation; 1.5.2. Regional cyber cooperation; 1.5.3. Track II cyber diplomacy; 1.5.4. Legal cooperation in combating cyber crimes; 1.5.5. Technical cooperation; 1.5.5.1. CNCERT; 1.5.5.2. CNNIC; 1.5.5.3. ISC; 1.5.6. Office for Cyber Affairs of the MFA; 1.6. A cyber security strategy in the making?; 1.6.1. Significance of the Internet for China; 1.6.2. Goals and objectives; 1.6.3. Cyber threat landscape; 1.6.4. Means for strategic goals; 1.7. Conclusion
Chapter 2: PLA Views on Informationized Warfare, Information Warfare and Information Operations 2.1. The evolution of Chinese military thinking; 2.2. The growing importance of information; 2.3. Information operations; 2.3.1. Command and control missions; 2.3.2. Offensive information missions; 2.3.2.1. Information coercion/information deterrence; 2.3.2.2. Information blockade; 2.3.2.3. Information misdirection; 2.3.2.4. Information contamination; 2.3.2.5. Information paralysis; 2.3.3. Defensive information missions; 2.3.4. Information support and safeguarding missions
2.4. Key types of information operations
Record Nr. UNINA-9910132157603321
London, [England] ; ; Hoboken, New Jersey : , : ISTE : , : Wiley, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Chinese cybersecurity and defense / / edited by Daniel Ventre
Chinese cybersecurity and defense / / edited by Daniel Ventre
Pubbl/distr/stampa London, [England] ; ; Hoboken, New Jersey : , : ISTE : , : Wiley, , 2014
Descrizione fisica 1 online resource (321 p.)
Disciplina 005.8
Collana ISTE
Soggetto topico Computer security
Internet - Security measures
ISBN 1-119-00900-6
1-119-00901-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright; Contents; Author Biographies; Introduction; Chapter 1: China's Internet Development and Cyber security - Policies and Practices; 1.1. Introduction; 1.2. Internet development in China: an overview; 1.3. China's policies towards Internet development; 1.3.1. From the very beginning of its development,China's Internet has been closely linked to the Chinese economy, and was programmed and integrated into its macro economic development blueprints
1.3.2. In addition to lending full policy support to Internet development, China also invests heavily in building Internet infrastructures 1.3.3. The Chinese government actively promotes the R&D of next-generation Internet (NGI); 1.3.4. China practices a policy of managing cyber affairs in line with law, adhering to the principles of scientific and effective administration in its Internet governance; 1.4. Cyber legislation and Internet administration; 1.4.1. Basic principles and practices of Internet administration in China; 1.4.1.1. Laws and regulations on Internet administration
1.4.1.2. The leading role of the Chinese government in Internet administration 1.4.1.3. Industry self-regulation; 1.4.1.4. Public supervision through special websites; 1.4.2. Guaranteeing the free and secure flow of information in cyberspace; 1.4.2.1. Guaranteeing Citizens' Freedom of Speech on the Internet; 1.4.2.1.1. Constitutional guarantee; 1.4.2.1.2. Public supervision via the Internet; 1.4.2.1.3. CCDI website for public supervision; 1.4.2.1.4. Protecting citizens' online privacy; 1.4.2.1.5. Guaranteeing online safety for minors; 1.4.2.2. Protecting Internet Security
1.5. Cyber security and diplomacy: an international perspective 1.5.1. Cyber policy dialogue and consultation; 1.5.2. Regional cyber cooperation; 1.5.3. Track II cyber diplomacy; 1.5.4. Legal cooperation in combating cyber crimes; 1.5.5. Technical cooperation; 1.5.5.1. CNCERT; 1.5.5.2. CNNIC; 1.5.5.3. ISC; 1.5.6. Office for Cyber Affairs of the MFA; 1.6. A cyber security strategy in the making?; 1.6.1. Significance of the Internet for China; 1.6.2. Goals and objectives; 1.6.3. Cyber threat landscape; 1.6.4. Means for strategic goals; 1.7. Conclusion
Chapter 2: PLA Views on Informationized Warfare, Information Warfare and Information Operations 2.1. The evolution of Chinese military thinking; 2.2. The growing importance of information; 2.3. Information operations; 2.3.1. Command and control missions; 2.3.2. Offensive information missions; 2.3.2.1. Information coercion/information deterrence; 2.3.2.2. Information blockade; 2.3.2.3. Information misdirection; 2.3.2.4. Information contamination; 2.3.2.5. Information paralysis; 2.3.3. Defensive information missions; 2.3.4. Information support and safeguarding missions
2.4. Key types of information operations
Record Nr. UNINA-9910815351103321
London, [England] ; ; Hoboken, New Jersey : , : ISTE : , : Wiley, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber conflict [[electronic resource] ] : competing national perspectives / / edited by Daniel Ventre
Cyber conflict [[electronic resource] ] : competing national perspectives / / edited by Daniel Ventre
Autore Ventre Daniel
Edizione [1st edition]
Pubbl/distr/stampa London, : Iste
Descrizione fisica 1 online resource (345 p.)
Disciplina 363.325/6004678
Altri autori (Persone) VentreDaniel
Collana ISTE
Soggetto topico Internet - Security measures
Cyberspace - Security measures
Computer networks - Security measures
ISBN 1-118-56266-6
1-118-56274-7
1-118-56296-8
1-299-18890-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright Page; Table of Contents; Introduction; Chapter 1. Canada's Cyber Security Policy: a Tortuous Path Toward a Cyber Security Strategy; 1.1. Introduction; 1.2. Canada in North America: sovereign but subordinate?; 1.3. Counter-terrorism for the improvement of national security; 1.4. The long path to a national CI protection strategy and nationalcyber security strategy; 1.5. The adoption of the current strategies for CI protection and cyber security; 1.6. Conclusion; 1.7. Bibliography; 1.7.1. Scientific and media articles; 1.7.2. Primary Data; 1.7.3. Websites
Chapter 2. Cuba: Towards an Active Cyber-defense2.1. Cyberspace: statistics and history; 2.1.1. The marginalization of Cuba; 2.1.2. Cuban cyberspace as the target of attacks; 2.2. Theoretical and practical considerations on information warfareand cyber-warfare; 2.2.1. Development of capabilities; 2.3. Cyber-warfare theories and practices; 2.3.1. Fidel Castro's discourse; 2.3.2. The concept of active cyber-defense; 2.4. Regulations and ways around them; 2.4.1. The State's influence over cyberspace; 2.4.2. Getting around the restrictions
2.5. Capabilities of control, surveillance and interception2.6. Enemies; 2.7. Conclusion; 2.8. Bibliography; Chapter 3. French Perspectives on Cyber-conflict; 3.1. Cyberspace; 3.2. Assessments, view on the world and awakening; 3.2.1. Attacks; 3.2.2. The feeling of insecurity, the threat; 3.2.3. Potential vulnerabilities of States; 3.2.4. Evolution of the international environment; 3.3. Reaction, position of France and choice: theories, political strategies and military doctrines; 3.3.1. Information: a powerful weapon for those controlling it; 3.3.2. Media information: beneficial if controlled
3.3.3. Economic information as power, if controlled3.3.4. Information warfare; 3.3.5. Information warfare or information control; 3.3.6. The ANSSI; 3.3.7. Cyber-security and cyber-defense; 3.3.8. Army: Information operations, NEB (numérisation de l'espace de bataille/digitization of battlespace), info-development; 3.3.9. Cyber-war and other modalities of the cyber-conflict; 3.4. Conclusion; 3.5. Bibliography; Chapter 4. Digital Sparta: Information Operationsand Cyber-warfare in Greece; 4.1. Geopolitical significance; 4.2. Strategic concerns and internal balancing
4.3. Formative experiences in information operations: the Ergenekon conspiracy4.4. Formative experiences in information operations:intensifying cyber-attacks; 4.5. Formative experiences in information operations: the Öcalan affair; 4.6. Formative experiences in information operations: the Greek wiretapping case of 2004-2005; 4.7. Emerging civilian information operations strategies; 4.8. Emerging military information operations strategies; 4.9. The European Union dimension in Greek information operations; 4.10. Conclusion; 4.11. Bibliography
Chapter 5. Moving Toward an Italian Cyber Defenseand Security Strategy
Record Nr. UNINA-9910138856703321
Ventre Daniel  
London, : Iste
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber conflict : competing national perspectives / / edited by Daniel Ventre
Cyber conflict : competing national perspectives / / edited by Daniel Ventre
Autore Ventre Daniel
Edizione [1st edition]
Pubbl/distr/stampa London, : Iste
Descrizione fisica 1 online resource (345 p.)
Disciplina 363.325/6004678
Altri autori (Persone) VentreDaniel
Collana ISTE
Soggetto topico Internet - Security measures
Cyberspace - Security measures
Computer networks - Security measures
ISBN 9781118562666
1118562666
9781118562741
1118562747
9781118562963
1118562968
9781299188907
1299188907
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright Page; Table of Contents; Introduction; Chapter 1. Canada's Cyber Security Policy: a Tortuous Path Toward a Cyber Security Strategy; 1.1. Introduction; 1.2. Canada in North America: sovereign but subordinate?; 1.3. Counter-terrorism for the improvement of national security; 1.4. The long path to a national CI protection strategy and nationalcyber security strategy; 1.5. The adoption of the current strategies for CI protection and cyber security; 1.6. Conclusion; 1.7. Bibliography; 1.7.1. Scientific and media articles; 1.7.2. Primary Data; 1.7.3. Websites
Chapter 2. Cuba: Towards an Active Cyber-defense2.1. Cyberspace: statistics and history; 2.1.1. The marginalization of Cuba; 2.1.2. Cuban cyberspace as the target of attacks; 2.2. Theoretical and practical considerations on information warfareand cyber-warfare; 2.2.1. Development of capabilities; 2.3. Cyber-warfare theories and practices; 2.3.1. Fidel Castro's discourse; 2.3.2. The concept of active cyber-defense; 2.4. Regulations and ways around them; 2.4.1. The State's influence over cyberspace; 2.4.2. Getting around the restrictions
2.5. Capabilities of control, surveillance and interception2.6. Enemies; 2.7. Conclusion; 2.8. Bibliography; Chapter 3. French Perspectives on Cyber-conflict; 3.1. Cyberspace; 3.2. Assessments, view on the world and awakening; 3.2.1. Attacks; 3.2.2. The feeling of insecurity, the threat; 3.2.3. Potential vulnerabilities of States; 3.2.4. Evolution of the international environment; 3.3. Reaction, position of France and choice: theories, political strategies and military doctrines; 3.3.1. Information: a powerful weapon for those controlling it; 3.3.2. Media information: beneficial if controlled
3.3.3. Economic information as power, if controlled3.3.4. Information warfare; 3.3.5. Information warfare or information control; 3.3.6. The ANSSI; 3.3.7. Cyber-security and cyber-defense; 3.3.8. Army: Information operations, NEB (numérisation de l'espace de bataille/digitization of battlespace), info-development; 3.3.9. Cyber-war and other modalities of the cyber-conflict; 3.4. Conclusion; 3.5. Bibliography; Chapter 4. Digital Sparta: Information Operationsand Cyber-warfare in Greece; 4.1. Geopolitical significance; 4.2. Strategic concerns and internal balancing
4.3. Formative experiences in information operations: the Ergenekon conspiracy4.4. Formative experiences in information operations:intensifying cyber-attacks; 4.5. Formative experiences in information operations: the Öcalan affair; 4.6. Formative experiences in information operations: the Greek wiretapping case of 2004-2005; 4.7. Emerging civilian information operations strategies; 4.8. Emerging military information operations strategies; 4.9. The European Union dimension in Greek information operations; 4.10. Conclusion; 4.11. Bibliography
Chapter 5. Moving Toward an Italian Cyber Defenseand Security Strategy
Record Nr. UNINA-9910820094103321
Ventre Daniel  
London, : Iste
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cybercrime during the SARS-Cov-2 pandemic (2019-2022) : evolutions, adaptations, consequences / / edited by Daniel Ventre, Hugo Loiseau
Cybercrime during the SARS-Cov-2 pandemic (2019-2022) : evolutions, adaptations, consequences / / edited by Daniel Ventre, Hugo Loiseau
Pubbl/distr/stampa London, England : , : ISTE Ltd and John Wiley & Sons, Inc., , [2023]
Descrizione fisica 1 online resource (256 pages)
Disciplina 345.730268
Soggetto topico Computer crimes
Computer viruses
Criminal jurisdiction
ISBN 1-394-22634-9
1-394-22632-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover -- Title Page -- Copyright Page -- Contents -- Introduction -- Chapter 1. The Evolution of Cybercrime During the Covid-19 Crisis -- 1.1. Introduction -- 1.2. Observing the evolution of cybercrime -- 1.2.1. Leveraging annual data: the case of India -- 1.2.2. Leveraging monthly data -- 1.2.3. Leveraging weekly data: the case of China -- 1.3. Has the global geography of cyberattacks changed? -- 1.4. Conclusion -- 1.5. Appendix -- 1.5.1. Cybercrime tools: malware -- 1.5.2. CVSS as indicators of vulnerability levels -- 1.5.3. Heterogeneity and complexity of cybercrime typologies -- 1.5.4. Attitude of companies toward cyber risks: the case of the United Kingdom -- 1.6. References -- Chapter 2. The SARS-CoV-2 Pandemic Crisis and the Evolution of Cybercrime in the United States and Canada -- 2.1. Introduction -- 2.2. The impacts of the SARS-CoV-2 pandemic -- 2.3. Cybercrime and SARS-CoV-2 -- 2.3.1. Targets and victims -- 2.3.2. Malicious actors -- 2.3.3. Cyberspace: a propitious environment for cybercrime -- 2.4. The evolution of cybercrime in North America during the pandemic -- 2.4.1. The United States -- 2.4.2. Canada -- 2.5. Discussion -- 2.6. Conclusion -- 2.7. Acknowledgments -- 2.8. References -- Chapter 3. Online Radicalization as Cybercrime: American Militancy During Covid-19 -- 3.1. Introduction -- 3.2. A new typology of cybercrime -- 3.3. Internet connectivity and violent militancy -- 3.4. The pre-pandemic domestic threat landscape -- 3.5. The domestic threat landscape of the pandemic -- 3.6. Pandemic accelerationism -- 3.7. From virtual to real-life criminality -- 3.8. Online radicalization during Covid-19 -- 3.9. A new methodological paradigm for online radicalization? -- 3.10. Conclusion: meta-radicalization as cybercrime -- 3.11. References.
Chapter 4. Cybercrime in Brazil After the Covid-19 Global Crisis: An Assessment of the Policies Concerning International Cooperation for Investigations and Prosecutions -- 4.1. Introduction: Brazilian cybercrime and the Covid crisis impact -- 4.2. Cybercrime in the literature and the Brazilian case -- 4.3. A theoretical model for international cooperation -- 4.4. The evolution of cybercrime in Brazil -- 4.5. The evolution of the Brazilian legal system concerning cybercrime and its connection to the international regime -- 4.6. Managing international cooperation without having the best tools -- 4.7. Difficulties with cooperation: joints, mortises, and notches -- 4.8. Conclusion: what to expect from the future? -- 4.9. References -- 4.10. Appendix: List of interviews and questions -- Chapter 5. Has Covid-19 Changed Fear and Victimization of Online Identity Theft in Portugal? -- 5.1. Introduction -- 5.2. The impact of the Covid-19 pandemic on cybercrime -- 5.3. Evolution of cybercrime in Portugal -- 5.4. Online identity theft (OIT) -- 5.4.1. Definition and modus operandi -- 5.4.2. RAT applied to cyberspace -- 5.4.3. Individual variables and OIT victimization -- 5.5. Fear of (online) crime -- 5.5.1. Determinants of fear of (online) crime -- 5.6. The present study -- 5.6.1. Measures -- 5.6.2. Results -- 5.6.3. Variables associated with online victimization and fear of identity theft -- 5.7. Conclusion -- 5.8. References -- Chapter 6. A South African Perspective on Cybercrime During the Pandemic -- 6.1. Introduction -- 6.1.1. Background to South Africa and the pandemic -- 6.1.2. Methodology -- 6.2. International rankings -- 6.3. Cybercrime and related legislation -- 6.4. Cybersecurity incidents -- 6.4.1. Ransomware -- 6.4.2. Scams and fraud -- 6.4.3. System intrusions and data breaches -- 6.4.4. Disinformation and malicious communications -- 6.4.5. Other.
6.5. Discussion -- 6.6. Conclusion -- 6.7. References -- List of Authors -- Index -- EULA.
Record Nr. UNINA-9910830147403321
London, England : , : ISTE Ltd and John Wiley & Sons, Inc., , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cybersecurity in humanities and social sciences : a research methods approach / / edited by Hugo Loiseau, Daniel Ventre, Hartmut Aden
Cybersecurity in humanities and social sciences : a research methods approach / / edited by Hugo Loiseau, Daniel Ventre, Hartmut Aden
Pubbl/distr/stampa London, England ; ; Hoboken, New Jersey : , : ISTE : , : Wiley, , [2020]
Descrizione fisica 1 online resource (241 pages)
Disciplina 005.8
Soggetto topico Computer security - Research
ISBN 1-119-77757-7
1-119-77758-5
1-119-77756-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910555266903321
London, England ; ; Hoboken, New Jersey : , : ISTE : , : Wiley, , [2020]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cybersecurity in humanities and social sciences : a research methods approach / / edited by Hugo Loiseau, Daniel Ventre, Hartmut Aden
Cybersecurity in humanities and social sciences : a research methods approach / / edited by Hugo Loiseau, Daniel Ventre, Hartmut Aden
Pubbl/distr/stampa London, England ; ; Hoboken, New Jersey : , : ISTE : , : Wiley, , [2020]
Descrizione fisica 1 online resource (241 pages)
Disciplina 005.8
Soggetto topico Computer security - Research
ISBN 1-119-77757-7
1-119-77758-5
1-119-77756-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910816707003321
London, England ; ; Hoboken, New Jersey : , : ISTE : , : Wiley, , [2020]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyberwar and information warfare [[electronic resource] /] / edited by Daniel Ventre
Cyberwar and information warfare [[electronic resource] /] / edited by Daniel Ventre
Autore Ventre Daniel
Edizione [1st edition]
Pubbl/distr/stampa London, : ISTE
Descrizione fisica 1 online resource (434 p.)
Disciplina 355.3/43
355.343
Altri autori (Persone) VentreDaniel
Collana ISTE
Soggetto topico Information warfare
Psychological warfare
Computer crimes
Soggetto genere / forma Electronic books.
ISBN 1-118-60348-6
1-299-18789-7
1-118-60339-7
1-118-60351-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Cyberwar and Information Warfare; Title Page; Copyright Page; Table of Contents; Introduction; List of Acronyms; Chapter 1. Cyberwar and its Borders; 1.1. The seduction of cyberwar; 1.2. Desirable, vulnerable and frightening information; 1.3. Conflict and its dimensions; 1.4. The Helm and space; 1.5. Between knowledge and violence; 1.6. Space, distance and paths; 1.7. The permanency of war; 1.8. No war without borders; 1.9. The enemy and the sovereign; 1.10. Strengths and weaknesses; 1.11. Bibliography; Chapter 2. War of Meaning, Cyberwar and Democracies; 2.1. Introduction
2.2. Informational environment, a new operating space for strategy2.2.1. War and information: stakes for the West; 2.2.2. Strategy in the information environment; 2.2.3. Winning the battle of legitimacies; 2.3. Influence strategy: defeating and limiting armed force physical involvement; 2.3.1. Describing the aggressor; 2.3.2. Armed forces and the information environment; 2.3.3. The need for moral force; 2.4. Conclusion; 2.5. Bibliography; Chapter 3. Intelligence, the First Defense? Information Warfare and Strategic Surprise; 3.1. Information warfare, information and war
3.2. Intelligence and strategic surprise3.2.1. Strategic surprise; 3.2.2. Perception of surprise; 3.2.3. Perception of the possibility of surprise; 3.3. Strategic surprise and information warfare; 3.4. Concluding remarks: surprise in strategic studies; 3.5. Bibliography; Chapter 4. Cyberconflict: Stakes of Power; 4.1. Stakes of power; 4.1.1. Power relations; 4.1.2. Expression of sovereignty; 4.1.3. Cyberpower; 4.1.4. Measuring and locating power; 4.1.5. Limits of exercising power; 4.1.6. The Monroe doctrine; 4.1.7. Globalization; 4.1.8. Shock theories; 4.1.9. Naval and maritime power strategy
4.1.10. Air/space and cybernetic power: analogies4.1.11. Cyberconflict/cyber weapons, chemical/biological weapons: comparisons; 4.1.12. Cyberconflict/cyber weapons, Cold War, nuclear weapons: comparisons; 4.1.13. Cyberconflict and new wars; 4.2. The Stuxnet affair; 4.3. Bibliography; Chapter 5. Operational Aspects of a Cyberattack: Intelligence, Planning and Conduct; 5.1. Introduction; 5.2. Towards a broader concept of cyberwar; 5.2.1. War and cyberwar: common ground; 5.2.2. New orders in cyberwar; 5.2.3. Who are cyberwarriors?; 5.2.4. Is formalization possible?
5.3. Concept of critical infrastructure5.3.1. Generalized definition of the notion of critical infrastructure; 5.3.2. System interdependence; 5.4. Different phases of a cyberattack; 5.4.1. Intelligence phase; 5.4.2. Planning phase; 5.4.3. Conduct phase; 5.5. A few "elementary building blocks"; 5.5.1. General tactical framework; 5.5.2. Attacks on people; 5.5.3. Opinion manipulation and area control; 5.5.4. Military computer attack in a conventional operation; 5.6. Example scenario; 5.6.1. Tactical scenario; 5.6.2. The order of events; 5.6.3. Analysis; 5.7. Conclusion; 5.8. Bibliography
Chapter 6. Riots in Xinjiang and Chinese Information Warfare
Record Nr. UNINA-9910141487803321
Ventre Daniel  
London, : ISTE
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyberwar and information warfare [[electronic resource] /] / edited by Daniel Ventre
Cyberwar and information warfare [[electronic resource] /] / edited by Daniel Ventre
Autore Ventre Daniel
Edizione [1st edition]
Pubbl/distr/stampa London, : ISTE
Descrizione fisica 1 online resource (434 p.)
Disciplina 355.3/43
355.343
Altri autori (Persone) VentreDaniel
Collana ISTE
Soggetto topico Information warfare
Psychological warfare
Computer crimes
ISBN 1-118-60348-6
1-299-18789-7
1-118-60339-7
1-118-60351-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Cyberwar and Information Warfare; Title Page; Copyright Page; Table of Contents; Introduction; List of Acronyms; Chapter 1. Cyberwar and its Borders; 1.1. The seduction of cyberwar; 1.2. Desirable, vulnerable and frightening information; 1.3. Conflict and its dimensions; 1.4. The Helm and space; 1.5. Between knowledge and violence; 1.6. Space, distance and paths; 1.7. The permanency of war; 1.8. No war without borders; 1.9. The enemy and the sovereign; 1.10. Strengths and weaknesses; 1.11. Bibliography; Chapter 2. War of Meaning, Cyberwar and Democracies; 2.1. Introduction
2.2. Informational environment, a new operating space for strategy2.2.1. War and information: stakes for the West; 2.2.2. Strategy in the information environment; 2.2.3. Winning the battle of legitimacies; 2.3. Influence strategy: defeating and limiting armed force physical involvement; 2.3.1. Describing the aggressor; 2.3.2. Armed forces and the information environment; 2.3.3. The need for moral force; 2.4. Conclusion; 2.5. Bibliography; Chapter 3. Intelligence, the First Defense? Information Warfare and Strategic Surprise; 3.1. Information warfare, information and war
3.2. Intelligence and strategic surprise3.2.1. Strategic surprise; 3.2.2. Perception of surprise; 3.2.3. Perception of the possibility of surprise; 3.3. Strategic surprise and information warfare; 3.4. Concluding remarks: surprise in strategic studies; 3.5. Bibliography; Chapter 4. Cyberconflict: Stakes of Power; 4.1. Stakes of power; 4.1.1. Power relations; 4.1.2. Expression of sovereignty; 4.1.3. Cyberpower; 4.1.4. Measuring and locating power; 4.1.5. Limits of exercising power; 4.1.6. The Monroe doctrine; 4.1.7. Globalization; 4.1.8. Shock theories; 4.1.9. Naval and maritime power strategy
4.1.10. Air/space and cybernetic power: analogies4.1.11. Cyberconflict/cyber weapons, chemical/biological weapons: comparisons; 4.1.12. Cyberconflict/cyber weapons, Cold War, nuclear weapons: comparisons; 4.1.13. Cyberconflict and new wars; 4.2. The Stuxnet affair; 4.3. Bibliography; Chapter 5. Operational Aspects of a Cyberattack: Intelligence, Planning and Conduct; 5.1. Introduction; 5.2. Towards a broader concept of cyberwar; 5.2.1. War and cyberwar: common ground; 5.2.2. New orders in cyberwar; 5.2.3. Who are cyberwarriors?; 5.2.4. Is formalization possible?
5.3. Concept of critical infrastructure5.3.1. Generalized definition of the notion of critical infrastructure; 5.3.2. System interdependence; 5.4. Different phases of a cyberattack; 5.4.1. Intelligence phase; 5.4.2. Planning phase; 5.4.3. Conduct phase; 5.5. A few "elementary building blocks"; 5.5.1. General tactical framework; 5.5.2. Attacks on people; 5.5.3. Opinion manipulation and area control; 5.5.4. Military computer attack in a conventional operation; 5.6. Example scenario; 5.6.1. Tactical scenario; 5.6.2. The order of events; 5.6.3. Analysis; 5.7. Conclusion; 5.8. Bibliography
Chapter 6. Riots in Xinjiang and Chinese Information Warfare
Record Nr. UNINA-9910830507403321
Ventre Daniel  
London, : ISTE
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyberwar and information warfare / / edited by Daniel Ventre
Cyberwar and information warfare / / edited by Daniel Ventre
Edizione [1st edition]
Pubbl/distr/stampa London, : ISTE
Descrizione fisica 1 online resource (434 p.)
Disciplina 355.3/43
Altri autori (Persone) VentreDaniel
Collana ISTE
Soggetto topico Information warfare
Psychological warfare
Computer crimes
ISBN 9781118603482
1118603486
9781299187894
1299187897
9781118603390
1118603397
9781118603512
1118603516
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Cyberwar and Information Warfare; Title Page; Copyright Page; Table of Contents; Introduction; List of Acronyms; Chapter 1. Cyberwar and its Borders; 1.1. The seduction of cyberwar; 1.2. Desirable, vulnerable and frightening information; 1.3. Conflict and its dimensions; 1.4. The Helm and space; 1.5. Between knowledge and violence; 1.6. Space, distance and paths; 1.7. The permanency of war; 1.8. No war without borders; 1.9. The enemy and the sovereign; 1.10. Strengths and weaknesses; 1.11. Bibliography; Chapter 2. War of Meaning, Cyberwar and Democracies; 2.1. Introduction
2.2. Informational environment, a new operating space for strategy2.2.1. War and information: stakes for the West; 2.2.2. Strategy in the information environment; 2.2.3. Winning the battle of legitimacies; 2.3. Influence strategy: defeating and limiting armed force physical involvement; 2.3.1. Describing the aggressor; 2.3.2. Armed forces and the information environment; 2.3.3. The need for moral force; 2.4. Conclusion; 2.5. Bibliography; Chapter 3. Intelligence, the First Defense? Information Warfare and Strategic Surprise; 3.1. Information warfare, information and war
3.2. Intelligence and strategic surprise3.2.1. Strategic surprise; 3.2.2. Perception of surprise; 3.2.3. Perception of the possibility of surprise; 3.3. Strategic surprise and information warfare; 3.4. Concluding remarks: surprise in strategic studies; 3.5. Bibliography; Chapter 4. Cyberconflict: Stakes of Power; 4.1. Stakes of power; 4.1.1. Power relations; 4.1.2. Expression of sovereignty; 4.1.3. Cyberpower; 4.1.4. Measuring and locating power; 4.1.5. Limits of exercising power; 4.1.6. The Monroe doctrine; 4.1.7. Globalization; 4.1.8. Shock theories; 4.1.9. Naval and maritime power strategy
4.1.10. Air/space and cybernetic power: analogies4.1.11. Cyberconflict/cyber weapons, chemical/biological weapons: comparisons; 4.1.12. Cyberconflict/cyber weapons, Cold War, nuclear weapons: comparisons; 4.1.13. Cyberconflict and new wars; 4.2. The Stuxnet affair; 4.3. Bibliography; Chapter 5. Operational Aspects of a Cyberattack: Intelligence, Planning and Conduct; 5.1. Introduction; 5.2. Towards a broader concept of cyberwar; 5.2.1. War and cyberwar: common ground; 5.2.2. New orders in cyberwar; 5.2.3. Who are cyberwarriors?; 5.2.4. Is formalization possible?
5.3. Concept of critical infrastructure5.3.1. Generalized definition of the notion of critical infrastructure; 5.3.2. System interdependence; 5.4. Different phases of a cyberattack; 5.4.1. Intelligence phase; 5.4.2. Planning phase; 5.4.3. Conduct phase; 5.5. A few "elementary building blocks"; 5.5.1. General tactical framework; 5.5.2. Attacks on people; 5.5.3. Opinion manipulation and area control; 5.5.4. Military computer attack in a conventional operation; 5.6. Example scenario; 5.6.1. Tactical scenario; 5.6.2. The order of events; 5.6.3. Analysis; 5.7. Conclusion; 5.8. Bibliography
Chapter 6. Riots in Xinjiang and Chinese Information Warfare
Record Nr. UNINA-9911019820603321
London, : ISTE
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui