Armed conflict in the 21st century : the information revolution and post-modern warfare |
Autore | Metz Steven |
Pubbl/distr/stampa | [Place of publication not identified], : Strategic Studies Institute U S Army War College, 2000 |
Disciplina | 355.3/43 |
Soggetto topico |
War - Forecasting - United States
War - Effect of technology on Warfare, Conventional - Forecasting Information warfare Military doctrine Twenty-first century Military Science - General Military & Naval Science Law, Politics & Government |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910689332603321 |
Metz Steven | ||
[Place of publication not identified], : Strategic Studies Institute U S Army War College, 2000 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
China's cyberwarfare capability / / Elisabette M. Marvel |
Edizione | [1st ed.] |
Pubbl/distr/stampa | New York, : Nova Science Publishers, c2010 |
Descrizione fisica | 1 online resource (viii, 105 pages) : illustrations |
Disciplina | 355.3/43 |
Altri autori (Persone) | MarvelElisabette M |
Collana |
China in the 21st century
Computer science, technology and applications |
Soggetto topico |
Information warfare - China
Cyberspace - Security measures Information warfare - United States - Prevention Computer networks - Security measures - United States |
ISBN | 1-61671-417-4 |
Classificazione | 355.4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Capability of the people's republic of China to conduct cyber warfare and computer network exploitation / Bryan Krekel ... [et al.] before the U.S.-China Economic and Security Review Commission -- China's approach to cyber operations : implications for the United States / Larry M. Wortzel Commissioner, U.S.-China Economic and Security Review Commission, Hearing on "The Google predicament : transforming U.S. cyberspace policy to advance democracy, Security and Trade". |
Record Nr. | UNINA-9910821348403321 |
New York, : Nova Science Publishers, c2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber dragon : inside China's information warfare and cyber operations / / Dean Cheng |
Autore | Cheng Dean (Writer on national security) |
Pubbl/distr/stampa | Santa Barbara, Calif. : , : Praeger, an imprint of ABC-CLIO, LLC, , 2017 |
Descrizione fisica | 1 online resource (x, 290 pages) |
Disciplina | 355.3/43 |
Collana | Changing face of war |
Soggetto topico |
Cyberspace operations (Military science) - China
Information warfare - China |
ISBN |
979-84-00-63643-1
979-82-16-07049-8 1-4408-3565-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Setting the stage: China's evolving views of information -- China's military: this is not your father's PLA -- Informationized conflict: the strategic challenge of maintaining party control in the wake of the information revolution -- Information warfare: waging information campaigns in the next war -- Information operations: putting theory into practice -- Space and information warfare: a key battleground for information dominance -- Organizing to secure information dominance -- Chinese views of future warfare and implications for the United States. |
Altri titoli varianti | Inside China's information warfare and cyber operations |
Record Nr. | UNINA-9910136194603321 |
Cheng Dean (Writer on national security) | ||
Santa Barbara, Calif. : , : Praeger, an imprint of ABC-CLIO, LLC, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber warfare : techniques, tactics and tools for security practitioners / / Jason Andress, Steve Winterfeld ; Lillian Ablon, technical editor |
Autore | Andress Jason |
Edizione | [Second edition.] |
Pubbl/distr/stampa | Waltham, MA : , : Syngress, , 2014 |
Descrizione fisica | 1 online resource (xvii, 306 pages) : illustrations (some color) |
Disciplina | 355.3/43 |
Collana | Gale eBooks |
Soggetto topico |
Information warfare
Computer networks - Security measures |
ISBN | 0-12-416633-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Machine generated contents note: Foreword Introduction Chapter 1. What is Cyber Warfare? Chapter 2. The Cyberspace Battlefield Chapter 3. Cyber Doctrine Chapter 4. Cyber Warriors Chapter 5. Logical Weapons Chapter 6. Physical Weapons Chapter 7. Psychological Weapons Chapter 8. Computer Network Exploitation Chapter 9. Computer Network Attack Chapter 10. Computer Network Defense Chapter 11. Non-State Actors in Computer Network Operations Chapter 12. Legal System Impacts Chapter 13. Ethics Chapter 14. Cyberspace Challenges Chapter 15. The Future of Cyber War Appendix: Cyber Timeline. |
Record Nr. | UNINA-9910790539503321 |
Andress Jason | ||
Waltham, MA : , : Syngress, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber warfare : techniques, tactics and tools for security practitioners / / Jason Andress, Steve Winterfeld ; Lillian Ablon, technical editor |
Autore | Andress Jason |
Edizione | [Second edition.] |
Pubbl/distr/stampa | Waltham, MA : , : Syngress, , 2014 |
Descrizione fisica | 1 online resource (xvii, 306 pages) : illustrations (some color) |
Disciplina | 355.3/43 |
Collana | Gale eBooks |
Soggetto topico |
Information warfare
Computer networks - Security measures |
ISBN | 0-12-416633-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Machine generated contents note: Foreword Introduction Chapter 1. What is Cyber Warfare? Chapter 2. The Cyberspace Battlefield Chapter 3. Cyber Doctrine Chapter 4. Cyber Warriors Chapter 5. Logical Weapons Chapter 6. Physical Weapons Chapter 7. Psychological Weapons Chapter 8. Computer Network Exploitation Chapter 9. Computer Network Attack Chapter 10. Computer Network Defense Chapter 11. Non-State Actors in Computer Network Operations Chapter 12. Legal System Impacts Chapter 13. Ethics Chapter 14. Cyberspace Challenges Chapter 15. The Future of Cyber War Appendix: Cyber Timeline. |
Record Nr. | UNINA-9910821491503321 |
Andress Jason | ||
Waltham, MA : , : Syngress, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber workforce retention / / William E. Parker IV |
Autore | Parker William E., IV, <1973-> |
Pubbl/distr/stampa | Maxwell Air Force Base, Alabama : , : Air University Press, Air Force Research Institute, , 2016 |
Descrizione fisica | 1 online resource (xiii, 52 pages) : illustrations |
Disciplina | 355.3/43 |
Collana | Air Force Research Institute perspectives on cyber power |
Soggetto topico |
Cyberspace - Military aspects - United States
Information warfare - United States Airmen - United States |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910708462003321 |
Parker William E., IV, <1973-> | ||
Maxwell Air Force Base, Alabama : , : Air University Press, Air Force Research Institute, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyberwar and information warfare [[electronic resource] /] / edited by Daniel Ventre |
Autore | Ventre Daniel |
Edizione | [1st edition] |
Pubbl/distr/stampa | London, : ISTE |
Descrizione fisica | 1 online resource (434 p.) |
Disciplina |
355.3/43
355.343 |
Altri autori (Persone) | VentreDaniel |
Collana | ISTE |
Soggetto topico |
Information warfare
Psychological warfare Computer crimes |
Soggetto genere / forma | Electronic books. |
ISBN |
1-118-60348-6
1-299-18789-7 1-118-60339-7 1-118-60351-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Cyberwar and Information Warfare; Title Page; Copyright Page; Table of Contents; Introduction; List of Acronyms; Chapter 1. Cyberwar and its Borders; 1.1. The seduction of cyberwar; 1.2. Desirable, vulnerable and frightening information; 1.3. Conflict and its dimensions; 1.4. The Helm and space; 1.5. Between knowledge and violence; 1.6. Space, distance and paths; 1.7. The permanency of war; 1.8. No war without borders; 1.9. The enemy and the sovereign; 1.10. Strengths and weaknesses; 1.11. Bibliography; Chapter 2. War of Meaning, Cyberwar and Democracies; 2.1. Introduction
2.2. Informational environment, a new operating space for strategy2.2.1. War and information: stakes for the West; 2.2.2. Strategy in the information environment; 2.2.3. Winning the battle of legitimacies; 2.3. Influence strategy: defeating and limiting armed force physical involvement; 2.3.1. Describing the aggressor; 2.3.2. Armed forces and the information environment; 2.3.3. The need for moral force; 2.4. Conclusion; 2.5. Bibliography; Chapter 3. Intelligence, the First Defense? Information Warfare and Strategic Surprise; 3.1. Information warfare, information and war 3.2. Intelligence and strategic surprise3.2.1. Strategic surprise; 3.2.2. Perception of surprise; 3.2.3. Perception of the possibility of surprise; 3.3. Strategic surprise and information warfare; 3.4. Concluding remarks: surprise in strategic studies; 3.5. Bibliography; Chapter 4. Cyberconflict: Stakes of Power; 4.1. Stakes of power; 4.1.1. Power relations; 4.1.2. Expression of sovereignty; 4.1.3. Cyberpower; 4.1.4. Measuring and locating power; 4.1.5. Limits of exercising power; 4.1.6. The Monroe doctrine; 4.1.7. Globalization; 4.1.8. Shock theories; 4.1.9. Naval and maritime power strategy 4.1.10. Air/space and cybernetic power: analogies4.1.11. Cyberconflict/cyber weapons, chemical/biological weapons: comparisons; 4.1.12. Cyberconflict/cyber weapons, Cold War, nuclear weapons: comparisons; 4.1.13. Cyberconflict and new wars; 4.2. The Stuxnet affair; 4.3. Bibliography; Chapter 5. Operational Aspects of a Cyberattack: Intelligence, Planning and Conduct; 5.1. Introduction; 5.2. Towards a broader concept of cyberwar; 5.2.1. War and cyberwar: common ground; 5.2.2. New orders in cyberwar; 5.2.3. Who are cyberwarriors?; 5.2.4. Is formalization possible? 5.3. Concept of critical infrastructure5.3.1. Generalized definition of the notion of critical infrastructure; 5.3.2. System interdependence; 5.4. Different phases of a cyberattack; 5.4.1. Intelligence phase; 5.4.2. Planning phase; 5.4.3. Conduct phase; 5.5. A few "elementary building blocks"; 5.5.1. General tactical framework; 5.5.2. Attacks on people; 5.5.3. Opinion manipulation and area control; 5.5.4. Military computer attack in a conventional operation; 5.6. Example scenario; 5.6.1. Tactical scenario; 5.6.2. The order of events; 5.6.3. Analysis; 5.7. Conclusion; 5.8. Bibliography Chapter 6. Riots in Xinjiang and Chinese Information Warfare |
Record Nr. | UNINA-9910141487803321 |
Ventre Daniel | ||
London, : ISTE | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyberwar and information warfare [[electronic resource] /] / edited by Daniel Ventre |
Autore | Ventre Daniel |
Edizione | [1st edition] |
Pubbl/distr/stampa | London, : ISTE |
Descrizione fisica | 1 online resource (434 p.) |
Disciplina |
355.3/43
355.343 |
Altri autori (Persone) | VentreDaniel |
Collana | ISTE |
Soggetto topico |
Information warfare
Psychological warfare Computer crimes |
ISBN |
1-118-60348-6
1-299-18789-7 1-118-60339-7 1-118-60351-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Cyberwar and Information Warfare; Title Page; Copyright Page; Table of Contents; Introduction; List of Acronyms; Chapter 1. Cyberwar and its Borders; 1.1. The seduction of cyberwar; 1.2. Desirable, vulnerable and frightening information; 1.3. Conflict and its dimensions; 1.4. The Helm and space; 1.5. Between knowledge and violence; 1.6. Space, distance and paths; 1.7. The permanency of war; 1.8. No war without borders; 1.9. The enemy and the sovereign; 1.10. Strengths and weaknesses; 1.11. Bibliography; Chapter 2. War of Meaning, Cyberwar and Democracies; 2.1. Introduction
2.2. Informational environment, a new operating space for strategy2.2.1. War and information: stakes for the West; 2.2.2. Strategy in the information environment; 2.2.3. Winning the battle of legitimacies; 2.3. Influence strategy: defeating and limiting armed force physical involvement; 2.3.1. Describing the aggressor; 2.3.2. Armed forces and the information environment; 2.3.3. The need for moral force; 2.4. Conclusion; 2.5. Bibliography; Chapter 3. Intelligence, the First Defense? Information Warfare and Strategic Surprise; 3.1. Information warfare, information and war 3.2. Intelligence and strategic surprise3.2.1. Strategic surprise; 3.2.2. Perception of surprise; 3.2.3. Perception of the possibility of surprise; 3.3. Strategic surprise and information warfare; 3.4. Concluding remarks: surprise in strategic studies; 3.5. Bibliography; Chapter 4. Cyberconflict: Stakes of Power; 4.1. Stakes of power; 4.1.1. Power relations; 4.1.2. Expression of sovereignty; 4.1.3. Cyberpower; 4.1.4. Measuring and locating power; 4.1.5. Limits of exercising power; 4.1.6. The Monroe doctrine; 4.1.7. Globalization; 4.1.8. Shock theories; 4.1.9. Naval and maritime power strategy 4.1.10. Air/space and cybernetic power: analogies4.1.11. Cyberconflict/cyber weapons, chemical/biological weapons: comparisons; 4.1.12. Cyberconflict/cyber weapons, Cold War, nuclear weapons: comparisons; 4.1.13. Cyberconflict and new wars; 4.2. The Stuxnet affair; 4.3. Bibliography; Chapter 5. Operational Aspects of a Cyberattack: Intelligence, Planning and Conduct; 5.1. Introduction; 5.2. Towards a broader concept of cyberwar; 5.2.1. War and cyberwar: common ground; 5.2.2. New orders in cyberwar; 5.2.3. Who are cyberwarriors?; 5.2.4. Is formalization possible? 5.3. Concept of critical infrastructure5.3.1. Generalized definition of the notion of critical infrastructure; 5.3.2. System interdependence; 5.4. Different phases of a cyberattack; 5.4.1. Intelligence phase; 5.4.2. Planning phase; 5.4.3. Conduct phase; 5.5. A few "elementary building blocks"; 5.5.1. General tactical framework; 5.5.2. Attacks on people; 5.5.3. Opinion manipulation and area control; 5.5.4. Military computer attack in a conventional operation; 5.6. Example scenario; 5.6.1. Tactical scenario; 5.6.2. The order of events; 5.6.3. Analysis; 5.7. Conclusion; 5.8. Bibliography Chapter 6. Riots in Xinjiang and Chinese Information Warfare |
Record Nr. | UNINA-9910830507403321 |
Ventre Daniel | ||
London, : ISTE | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyberwar and information warfare [[electronic resource] /] / edited by Daniel Ventre |
Autore | Ventre Daniel |
Edizione | [1st edition] |
Pubbl/distr/stampa | London, : ISTE |
Descrizione fisica | 1 online resource (434 p.) |
Disciplina |
355.3/43
355.343 |
Altri autori (Persone) | VentreDaniel |
Collana | ISTE |
Soggetto topico |
Information warfare
Psychological warfare Computer crimes |
ISBN |
1-118-60348-6
1-299-18789-7 1-118-60339-7 1-118-60351-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Cyberwar and Information Warfare; Title Page; Copyright Page; Table of Contents; Introduction; List of Acronyms; Chapter 1. Cyberwar and its Borders; 1.1. The seduction of cyberwar; 1.2. Desirable, vulnerable and frightening information; 1.3. Conflict and its dimensions; 1.4. The Helm and space; 1.5. Between knowledge and violence; 1.6. Space, distance and paths; 1.7. The permanency of war; 1.8. No war without borders; 1.9. The enemy and the sovereign; 1.10. Strengths and weaknesses; 1.11. Bibliography; Chapter 2. War of Meaning, Cyberwar and Democracies; 2.1. Introduction
2.2. Informational environment, a new operating space for strategy2.2.1. War and information: stakes for the West; 2.2.2. Strategy in the information environment; 2.2.3. Winning the battle of legitimacies; 2.3. Influence strategy: defeating and limiting armed force physical involvement; 2.3.1. Describing the aggressor; 2.3.2. Armed forces and the information environment; 2.3.3. The need for moral force; 2.4. Conclusion; 2.5. Bibliography; Chapter 3. Intelligence, the First Defense? Information Warfare and Strategic Surprise; 3.1. Information warfare, information and war 3.2. Intelligence and strategic surprise3.2.1. Strategic surprise; 3.2.2. Perception of surprise; 3.2.3. Perception of the possibility of surprise; 3.3. Strategic surprise and information warfare; 3.4. Concluding remarks: surprise in strategic studies; 3.5. Bibliography; Chapter 4. Cyberconflict: Stakes of Power; 4.1. Stakes of power; 4.1.1. Power relations; 4.1.2. Expression of sovereignty; 4.1.3. Cyberpower; 4.1.4. Measuring and locating power; 4.1.5. Limits of exercising power; 4.1.6. The Monroe doctrine; 4.1.7. Globalization; 4.1.8. Shock theories; 4.1.9. Naval and maritime power strategy 4.1.10. Air/space and cybernetic power: analogies4.1.11. Cyberconflict/cyber weapons, chemical/biological weapons: comparisons; 4.1.12. Cyberconflict/cyber weapons, Cold War, nuclear weapons: comparisons; 4.1.13. Cyberconflict and new wars; 4.2. The Stuxnet affair; 4.3. Bibliography; Chapter 5. Operational Aspects of a Cyberattack: Intelligence, Planning and Conduct; 5.1. Introduction; 5.2. Towards a broader concept of cyberwar; 5.2.1. War and cyberwar: common ground; 5.2.2. New orders in cyberwar; 5.2.3. Who are cyberwarriors?; 5.2.4. Is formalization possible? 5.3. Concept of critical infrastructure5.3.1. Generalized definition of the notion of critical infrastructure; 5.3.2. System interdependence; 5.4. Different phases of a cyberattack; 5.4.1. Intelligence phase; 5.4.2. Planning phase; 5.4.3. Conduct phase; 5.5. A few "elementary building blocks"; 5.5.1. General tactical framework; 5.5.2. Attacks on people; 5.5.3. Opinion manipulation and area control; 5.5.4. Military computer attack in a conventional operation; 5.6. Example scenario; 5.6.1. Tactical scenario; 5.6.2. The order of events; 5.6.3. Analysis; 5.7. Conclusion; 5.8. Bibliography Chapter 6. Riots in Xinjiang and Chinese Information Warfare |
Record Nr. | UNINA-9910841006703321 |
Ventre Daniel | ||
London, : ISTE | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyberwar-Netwar [[electronic resource] ] : security in the information age / / edited by Fernando Duarte Carvalho and Eduardo Mateus da Silva |
Pubbl/distr/stampa | Amsterdam, : IOS Press, c2006 |
Descrizione fisica | 1 online resource (176 p.) |
Disciplina | 355.3/43 |
Altri autori (Persone) |
CarvalhoFernando Duarte
SilvaEduardo Mateus da |
Collana | NATO security through science series. Series D, Information and communication security |
Soggetto topico |
Computer networks - Security measures
Information warfare |
Soggetto genere / forma | Electronic books. |
ISBN |
6610547602
1-280-54760-X 9786610547609 1-4237-9751-5 1-60750-171-6 600-00-0389-7 1-60129-476-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Title page; Preface; List of Participants; Scientific Abstract of the Workshop; Contents; Part I. Around the World in 80 Milliseconds; Part II. Operational Security of Ubiquitous Information; Part III. Strategic Knowledge: How Intelligence and Security Tools Can Help; Final Report of the Workshop; Subject Index |
Record Nr. | UNINA-9910451027103321 |
Amsterdam, : IOS Press, c2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|