top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Armed conflict in the 21st century : the information revolution and post-modern warfare
Armed conflict in the 21st century : the information revolution and post-modern warfare
Autore Metz Steven
Pubbl/distr/stampa [Place of publication not identified], : Strategic Studies Institute U S Army War College, 2000
Disciplina 355.3/43
Soggetto topico War - Forecasting - United States
War - Effect of technology on
Warfare, Conventional - Forecasting
Information warfare
Military doctrine
Twenty-first century
Military Science - General
Military & Naval Science
Law, Politics & Government
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910689332603321
Metz Steven  
[Place of publication not identified], : Strategic Studies Institute U S Army War College, 2000
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
China's cyberwarfare capability / / Elisabette M. Marvel
China's cyberwarfare capability / / Elisabette M. Marvel
Edizione [1st ed.]
Pubbl/distr/stampa New York, : Nova Science Publishers, c2010
Descrizione fisica 1 online resource (viii, 105 pages) : illustrations
Disciplina 355.3/43
Altri autori (Persone) MarvelElisabette M
Collana China in the 21st century
Computer science, technology and applications
Soggetto topico Information warfare - China
Cyberspace - Security measures
Information warfare - United States - Prevention
Computer networks - Security measures - United States
ISBN 1-61671-417-4
Classificazione 355.4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Capability of the people's republic of China to conduct cyber warfare and computer network exploitation / Bryan Krekel ... [et al.] before the U.S.-China Economic and Security Review Commission -- China's approach to cyber operations : implications for the United States / Larry M. Wortzel Commissioner, U.S.-China Economic and Security Review Commission, Hearing on "The Google predicament : transforming U.S. cyberspace policy to advance democracy, Security and Trade".
Record Nr. UNINA-9910821348403321
New York, : Nova Science Publishers, c2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber dragon : inside China's information warfare and cyber operations / / Dean Cheng
Cyber dragon : inside China's information warfare and cyber operations / / Dean Cheng
Autore Cheng Dean (Writer on national security)
Pubbl/distr/stampa Santa Barbara, Calif. : , : Praeger, an imprint of ABC-CLIO, LLC, , 2017
Descrizione fisica 1 online resource (x, 290 pages)
Disciplina 355.3/43
Collana Changing face of war
Soggetto topico Cyberspace operations (Military science) - China
Information warfare - China
ISBN 979-84-00-63643-1
979-82-16-07049-8
1-4408-3565-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Setting the stage: China's evolving views of information -- China's military: this is not your father's PLA -- Informationized conflict: the strategic challenge of maintaining party control in the wake of the information revolution -- Information warfare: waging information campaigns in the next war -- Information operations: putting theory into practice -- Space and information warfare: a key battleground for information dominance -- Organizing to secure information dominance -- Chinese views of future warfare and implications for the United States.
Altri titoli varianti Inside China's information warfare and cyber operations
Record Nr. UNINA-9910136194603321
Cheng Dean (Writer on national security)  
Santa Barbara, Calif. : , : Praeger, an imprint of ABC-CLIO, LLC, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber warfare : techniques, tactics and tools for security practitioners / / Jason Andress, Steve Winterfeld ; Lillian Ablon, technical editor
Cyber warfare : techniques, tactics and tools for security practitioners / / Jason Andress, Steve Winterfeld ; Lillian Ablon, technical editor
Autore Andress Jason
Edizione [Second edition.]
Pubbl/distr/stampa Waltham, MA : , : Syngress, , 2014
Descrizione fisica 1 online resource (xvii, 306 pages) : illustrations (some color)
Disciplina 355.3/43
Collana Gale eBooks
Soggetto topico Information warfare
Computer networks - Security measures
ISBN 0-12-416633-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Machine generated contents note: Foreword Introduction Chapter 1. What is Cyber Warfare? Chapter 2. The Cyberspace Battlefield Chapter 3. Cyber Doctrine Chapter 4. Cyber Warriors Chapter 5. Logical Weapons Chapter 6. Physical Weapons Chapter 7. Psychological Weapons Chapter 8. Computer Network Exploitation Chapter 9. Computer Network Attack Chapter 10. Computer Network Defense Chapter 11. Non-State Actors in Computer Network Operations Chapter 12. Legal System Impacts Chapter 13. Ethics Chapter 14. Cyberspace Challenges Chapter 15. The Future of Cyber War Appendix: Cyber Timeline.
Record Nr. UNINA-9910790539503321
Andress Jason  
Waltham, MA : , : Syngress, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber warfare : techniques, tactics and tools for security practitioners / / Jason Andress, Steve Winterfeld ; Lillian Ablon, technical editor
Cyber warfare : techniques, tactics and tools for security practitioners / / Jason Andress, Steve Winterfeld ; Lillian Ablon, technical editor
Autore Andress Jason
Edizione [Second edition.]
Pubbl/distr/stampa Waltham, MA : , : Syngress, , 2014
Descrizione fisica 1 online resource (xvii, 306 pages) : illustrations (some color)
Disciplina 355.3/43
Collana Gale eBooks
Soggetto topico Information warfare
Computer networks - Security measures
ISBN 0-12-416633-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Machine generated contents note: Foreword Introduction Chapter 1. What is Cyber Warfare? Chapter 2. The Cyberspace Battlefield Chapter 3. Cyber Doctrine Chapter 4. Cyber Warriors Chapter 5. Logical Weapons Chapter 6. Physical Weapons Chapter 7. Psychological Weapons Chapter 8. Computer Network Exploitation Chapter 9. Computer Network Attack Chapter 10. Computer Network Defense Chapter 11. Non-State Actors in Computer Network Operations Chapter 12. Legal System Impacts Chapter 13. Ethics Chapter 14. Cyberspace Challenges Chapter 15. The Future of Cyber War Appendix: Cyber Timeline.
Record Nr. UNINA-9910821491503321
Andress Jason  
Waltham, MA : , : Syngress, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber workforce retention / / William E. Parker IV
Cyber workforce retention / / William E. Parker IV
Autore Parker William E., IV, <1973->
Pubbl/distr/stampa Maxwell Air Force Base, Alabama : , : Air University Press, Air Force Research Institute, , 2016
Descrizione fisica 1 online resource (xiii, 52 pages) : illustrations
Disciplina 355.3/43
Collana Air Force Research Institute perspectives on cyber power
Soggetto topico Cyberspace - Military aspects - United States
Information warfare - United States
Airmen - United States
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910708462003321
Parker William E., IV, <1973->  
Maxwell Air Force Base, Alabama : , : Air University Press, Air Force Research Institute, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyberwar and information warfare [[electronic resource] /] / edited by Daniel Ventre
Cyberwar and information warfare [[electronic resource] /] / edited by Daniel Ventre
Autore Ventre Daniel
Edizione [1st edition]
Pubbl/distr/stampa London, : ISTE
Descrizione fisica 1 online resource (434 p.)
Disciplina 355.3/43
355.343
Altri autori (Persone) VentreDaniel
Collana ISTE
Soggetto topico Information warfare
Psychological warfare
Computer crimes
Soggetto genere / forma Electronic books.
ISBN 1-118-60348-6
1-299-18789-7
1-118-60339-7
1-118-60351-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Cyberwar and Information Warfare; Title Page; Copyright Page; Table of Contents; Introduction; List of Acronyms; Chapter 1. Cyberwar and its Borders; 1.1. The seduction of cyberwar; 1.2. Desirable, vulnerable and frightening information; 1.3. Conflict and its dimensions; 1.4. The Helm and space; 1.5. Between knowledge and violence; 1.6. Space, distance and paths; 1.7. The permanency of war; 1.8. No war without borders; 1.9. The enemy and the sovereign; 1.10. Strengths and weaknesses; 1.11. Bibliography; Chapter 2. War of Meaning, Cyberwar and Democracies; 2.1. Introduction
2.2. Informational environment, a new operating space for strategy2.2.1. War and information: stakes for the West; 2.2.2. Strategy in the information environment; 2.2.3. Winning the battle of legitimacies; 2.3. Influence strategy: defeating and limiting armed force physical involvement; 2.3.1. Describing the aggressor; 2.3.2. Armed forces and the information environment; 2.3.3. The need for moral force; 2.4. Conclusion; 2.5. Bibliography; Chapter 3. Intelligence, the First Defense? Information Warfare and Strategic Surprise; 3.1. Information warfare, information and war
3.2. Intelligence and strategic surprise3.2.1. Strategic surprise; 3.2.2. Perception of surprise; 3.2.3. Perception of the possibility of surprise; 3.3. Strategic surprise and information warfare; 3.4. Concluding remarks: surprise in strategic studies; 3.5. Bibliography; Chapter 4. Cyberconflict: Stakes of Power; 4.1. Stakes of power; 4.1.1. Power relations; 4.1.2. Expression of sovereignty; 4.1.3. Cyberpower; 4.1.4. Measuring and locating power; 4.1.5. Limits of exercising power; 4.1.6. The Monroe doctrine; 4.1.7. Globalization; 4.1.8. Shock theories; 4.1.9. Naval and maritime power strategy
4.1.10. Air/space and cybernetic power: analogies4.1.11. Cyberconflict/cyber weapons, chemical/biological weapons: comparisons; 4.1.12. Cyberconflict/cyber weapons, Cold War, nuclear weapons: comparisons; 4.1.13. Cyberconflict and new wars; 4.2. The Stuxnet affair; 4.3. Bibliography; Chapter 5. Operational Aspects of a Cyberattack: Intelligence, Planning and Conduct; 5.1. Introduction; 5.2. Towards a broader concept of cyberwar; 5.2.1. War and cyberwar: common ground; 5.2.2. New orders in cyberwar; 5.2.3. Who are cyberwarriors?; 5.2.4. Is formalization possible?
5.3. Concept of critical infrastructure5.3.1. Generalized definition of the notion of critical infrastructure; 5.3.2. System interdependence; 5.4. Different phases of a cyberattack; 5.4.1. Intelligence phase; 5.4.2. Planning phase; 5.4.3. Conduct phase; 5.5. A few "elementary building blocks"; 5.5.1. General tactical framework; 5.5.2. Attacks on people; 5.5.3. Opinion manipulation and area control; 5.5.4. Military computer attack in a conventional operation; 5.6. Example scenario; 5.6.1. Tactical scenario; 5.6.2. The order of events; 5.6.3. Analysis; 5.7. Conclusion; 5.8. Bibliography
Chapter 6. Riots in Xinjiang and Chinese Information Warfare
Record Nr. UNINA-9910141487803321
Ventre Daniel  
London, : ISTE
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyberwar and information warfare [[electronic resource] /] / edited by Daniel Ventre
Cyberwar and information warfare [[electronic resource] /] / edited by Daniel Ventre
Autore Ventre Daniel
Edizione [1st edition]
Pubbl/distr/stampa London, : ISTE
Descrizione fisica 1 online resource (434 p.)
Disciplina 355.3/43
355.343
Altri autori (Persone) VentreDaniel
Collana ISTE
Soggetto topico Information warfare
Psychological warfare
Computer crimes
ISBN 1-118-60348-6
1-299-18789-7
1-118-60339-7
1-118-60351-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Cyberwar and Information Warfare; Title Page; Copyright Page; Table of Contents; Introduction; List of Acronyms; Chapter 1. Cyberwar and its Borders; 1.1. The seduction of cyberwar; 1.2. Desirable, vulnerable and frightening information; 1.3. Conflict and its dimensions; 1.4. The Helm and space; 1.5. Between knowledge and violence; 1.6. Space, distance and paths; 1.7. The permanency of war; 1.8. No war without borders; 1.9. The enemy and the sovereign; 1.10. Strengths and weaknesses; 1.11. Bibliography; Chapter 2. War of Meaning, Cyberwar and Democracies; 2.1. Introduction
2.2. Informational environment, a new operating space for strategy2.2.1. War and information: stakes for the West; 2.2.2. Strategy in the information environment; 2.2.3. Winning the battle of legitimacies; 2.3. Influence strategy: defeating and limiting armed force physical involvement; 2.3.1. Describing the aggressor; 2.3.2. Armed forces and the information environment; 2.3.3. The need for moral force; 2.4. Conclusion; 2.5. Bibliography; Chapter 3. Intelligence, the First Defense? Information Warfare and Strategic Surprise; 3.1. Information warfare, information and war
3.2. Intelligence and strategic surprise3.2.1. Strategic surprise; 3.2.2. Perception of surprise; 3.2.3. Perception of the possibility of surprise; 3.3. Strategic surprise and information warfare; 3.4. Concluding remarks: surprise in strategic studies; 3.5. Bibliography; Chapter 4. Cyberconflict: Stakes of Power; 4.1. Stakes of power; 4.1.1. Power relations; 4.1.2. Expression of sovereignty; 4.1.3. Cyberpower; 4.1.4. Measuring and locating power; 4.1.5. Limits of exercising power; 4.1.6. The Monroe doctrine; 4.1.7. Globalization; 4.1.8. Shock theories; 4.1.9. Naval and maritime power strategy
4.1.10. Air/space and cybernetic power: analogies4.1.11. Cyberconflict/cyber weapons, chemical/biological weapons: comparisons; 4.1.12. Cyberconflict/cyber weapons, Cold War, nuclear weapons: comparisons; 4.1.13. Cyberconflict and new wars; 4.2. The Stuxnet affair; 4.3. Bibliography; Chapter 5. Operational Aspects of a Cyberattack: Intelligence, Planning and Conduct; 5.1. Introduction; 5.2. Towards a broader concept of cyberwar; 5.2.1. War and cyberwar: common ground; 5.2.2. New orders in cyberwar; 5.2.3. Who are cyberwarriors?; 5.2.4. Is formalization possible?
5.3. Concept of critical infrastructure5.3.1. Generalized definition of the notion of critical infrastructure; 5.3.2. System interdependence; 5.4. Different phases of a cyberattack; 5.4.1. Intelligence phase; 5.4.2. Planning phase; 5.4.3. Conduct phase; 5.5. A few "elementary building blocks"; 5.5.1. General tactical framework; 5.5.2. Attacks on people; 5.5.3. Opinion manipulation and area control; 5.5.4. Military computer attack in a conventional operation; 5.6. Example scenario; 5.6.1. Tactical scenario; 5.6.2. The order of events; 5.6.3. Analysis; 5.7. Conclusion; 5.8. Bibliography
Chapter 6. Riots in Xinjiang and Chinese Information Warfare
Record Nr. UNINA-9910830507403321
Ventre Daniel  
London, : ISTE
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyberwar and information warfare [[electronic resource] /] / edited by Daniel Ventre
Cyberwar and information warfare [[electronic resource] /] / edited by Daniel Ventre
Autore Ventre Daniel
Edizione [1st edition]
Pubbl/distr/stampa London, : ISTE
Descrizione fisica 1 online resource (434 p.)
Disciplina 355.3/43
355.343
Altri autori (Persone) VentreDaniel
Collana ISTE
Soggetto topico Information warfare
Psychological warfare
Computer crimes
ISBN 1-118-60348-6
1-299-18789-7
1-118-60339-7
1-118-60351-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Cyberwar and Information Warfare; Title Page; Copyright Page; Table of Contents; Introduction; List of Acronyms; Chapter 1. Cyberwar and its Borders; 1.1. The seduction of cyberwar; 1.2. Desirable, vulnerable and frightening information; 1.3. Conflict and its dimensions; 1.4. The Helm and space; 1.5. Between knowledge and violence; 1.6. Space, distance and paths; 1.7. The permanency of war; 1.8. No war without borders; 1.9. The enemy and the sovereign; 1.10. Strengths and weaknesses; 1.11. Bibliography; Chapter 2. War of Meaning, Cyberwar and Democracies; 2.1. Introduction
2.2. Informational environment, a new operating space for strategy2.2.1. War and information: stakes for the West; 2.2.2. Strategy in the information environment; 2.2.3. Winning the battle of legitimacies; 2.3. Influence strategy: defeating and limiting armed force physical involvement; 2.3.1. Describing the aggressor; 2.3.2. Armed forces and the information environment; 2.3.3. The need for moral force; 2.4. Conclusion; 2.5. Bibliography; Chapter 3. Intelligence, the First Defense? Information Warfare and Strategic Surprise; 3.1. Information warfare, information and war
3.2. Intelligence and strategic surprise3.2.1. Strategic surprise; 3.2.2. Perception of surprise; 3.2.3. Perception of the possibility of surprise; 3.3. Strategic surprise and information warfare; 3.4. Concluding remarks: surprise in strategic studies; 3.5. Bibliography; Chapter 4. Cyberconflict: Stakes of Power; 4.1. Stakes of power; 4.1.1. Power relations; 4.1.2. Expression of sovereignty; 4.1.3. Cyberpower; 4.1.4. Measuring and locating power; 4.1.5. Limits of exercising power; 4.1.6. The Monroe doctrine; 4.1.7. Globalization; 4.1.8. Shock theories; 4.1.9. Naval and maritime power strategy
4.1.10. Air/space and cybernetic power: analogies4.1.11. Cyberconflict/cyber weapons, chemical/biological weapons: comparisons; 4.1.12. Cyberconflict/cyber weapons, Cold War, nuclear weapons: comparisons; 4.1.13. Cyberconflict and new wars; 4.2. The Stuxnet affair; 4.3. Bibliography; Chapter 5. Operational Aspects of a Cyberattack: Intelligence, Planning and Conduct; 5.1. Introduction; 5.2. Towards a broader concept of cyberwar; 5.2.1. War and cyberwar: common ground; 5.2.2. New orders in cyberwar; 5.2.3. Who are cyberwarriors?; 5.2.4. Is formalization possible?
5.3. Concept of critical infrastructure5.3.1. Generalized definition of the notion of critical infrastructure; 5.3.2. System interdependence; 5.4. Different phases of a cyberattack; 5.4.1. Intelligence phase; 5.4.2. Planning phase; 5.4.3. Conduct phase; 5.5. A few "elementary building blocks"; 5.5.1. General tactical framework; 5.5.2. Attacks on people; 5.5.3. Opinion manipulation and area control; 5.5.4. Military computer attack in a conventional operation; 5.6. Example scenario; 5.6.1. Tactical scenario; 5.6.2. The order of events; 5.6.3. Analysis; 5.7. Conclusion; 5.8. Bibliography
Chapter 6. Riots in Xinjiang and Chinese Information Warfare
Record Nr. UNINA-9910841006703321
Ventre Daniel  
London, : ISTE
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyberwar-Netwar [[electronic resource] ] : security in the information age / / edited by Fernando Duarte Carvalho and Eduardo Mateus da Silva
Cyberwar-Netwar [[electronic resource] ] : security in the information age / / edited by Fernando Duarte Carvalho and Eduardo Mateus da Silva
Pubbl/distr/stampa Amsterdam, : IOS Press, c2006
Descrizione fisica 1 online resource (176 p.)
Disciplina 355.3/43
Altri autori (Persone) CarvalhoFernando Duarte
SilvaEduardo Mateus da
Collana NATO security through science series. Series D, Information and communication security
Soggetto topico Computer networks - Security measures
Information warfare
Soggetto genere / forma Electronic books.
ISBN 6610547602
1-280-54760-X
9786610547609
1-4237-9751-5
1-60750-171-6
600-00-0389-7
1-60129-476-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Title page; Preface; List of Participants; Scientific Abstract of the Workshop; Contents; Part I. Around the World in 80 Milliseconds; Part II. Operational Security of Ubiquitous Information; Part III. Strategic Knowledge: How Intelligence and Security Tools Can Help; Final Report of the Workshop; Subject Index
Record Nr. UNINA-9910451027103321
Amsterdam, : IOS Press, c2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui