top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
1
1
Autore Cocco, Giovanni
Pubbl/distr/stampa adova, : edam, , 980.
Descrizione fisica I, 229 p. ; 5 cm
Disciplina 355.343(Unità militari non combattenti. Servizi di guerra non convenzionali)
Soggetto topico Spionaggio e controspionaggio - Italia
Spionaggio e controspionaggio - Legislazione
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione ita
Record Nr. UNICAMPANIA-VAN00285697
Cocco, Giovanni  
adova, : edam, , 980.
Materiale a stampa
Lo trovi qui: Univ. Vanvitelli
Opac: Controlla la disponibilità qui
L'affaire Cicéron / L. C. Moyzisch ; adaptation française de Suzanne Belly
L'affaire Cicéron / L. C. Moyzisch ; adaptation française de Suzanne Belly
Autore Moyzisch, Ludwig Carl
Pubbl/distr/stampa Paris : J'ai lu, 1966
Descrizione fisica 192 p. ; 17 cm
Disciplina 355.343
Soggetto topico Guerra mondiale. 1939-1945 - Spionaggio
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione fre
Record Nr. UNISALENTO-991003861519707536
Moyzisch, Ludwig Carl  
Paris : J'ai lu, 1966
Materiale a stampa
Lo trovi qui: Univ. del Salento
Opac: Controlla la disponibilità qui
L'arte del servizio segreto / Allen Dulles
L'arte del servizio segreto / Allen Dulles
Autore Dulles, Allen Welsh
Pubbl/distr/stampa Milano : Garzanti, c1963
Descrizione fisica 325 p. : ill. ; 23 cm
Disciplina 355.343
Altri autori (Persone) Mercatali, Luciano
Collana Memorie e documenti
Soggetto topico Central intelligence agency
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione ita
Record Nr. UNISALENTO-991003443759707536
Dulles, Allen Welsh  
Milano : Garzanti, c1963
Materiale a stampa
Lo trovi qui: Univ. del Salento
Opac: Controlla la disponibilità qui
Behold a pale farce : cyberwar, threat inflation, & the malware industrial complex / / Bill Blunden, Violet Cheung
Behold a pale farce : cyberwar, threat inflation, & the malware industrial complex / / Bill Blunden, Violet Cheung
Autore Blunden Bill
Pubbl/distr/stampa Walterville, OR : , : Trine Day, , [2014]
Descrizione fisica 1 online resource (835 p.)
Disciplina 355.343
Soggetto topico Information warfare
Computer security - United States
ISBN 1-937584-81-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto CoverImage; Title Page; Copyright page; Dedication; Epigraph; Table of Contents; Media Massage; Firsthand Experience; The Public Relations Industry; Behold a Pale Farce; Organization; Acknowledgments; The Wonder of it All; Part I - Rampant Hyperbole; A Backdrop of Metaphors; Never Mind: False Alarm; The Madness of Crowds; An Electronic Pearl Harbor; A Cyber-Katrina; The Hiroshima of Cyberwar; A Cyber 9/11; Dissenting Voices; The Executive Responds; Stuxnet; Plan X; Presidential Policy Directive 20; Hacking Foreign Targets for Years; Oz the Great and Powerful; Our Frenemy in Asia
A Plurality of ActorsRule of Law Breaks Down; The Internet's Frontier Town; Opposing Models for Reform; The Extent of China's Capabilities; Joined at the Hip; Both Sides Keep the Other in Business; The #1 Threat to Economic Security?; Cyberwar as a Misdiagnosis; Dialing 911; Looking Ahead; Part II - A Series of Unfortunate Events; Cybercrime; The Ecosystem; A Snapshot of Cybercrime; The TJX Hack; The Heartland Payment Systems Breach; The DarkMarket Sting; The RBS WorldPay Attack; The Return of the Analyzer; The Ballad of Max Butler; Sony under Siege; The FIS Breach; The Big Picture
The Punch LineEspionage; Moonlight Maze; Titan Rain; Operation Byzantine Hades; GhostNet; Joint Strike Fighter Breach; Operation Aurora; Shadows in the Cloud; Night Dragon; RSA and SecurID; Operation Shady RAT; The Nitro Attacks; Targeting Certificate Authorities; Operation Red October; Patterns Emerge; The Scope of U.S. Espionage; The Malware-Industrial Complex; Independent Operators; Spies Abound ...; But Some Groups Spy More Than Others; The Infrastructure; The Financial System; The Power Grid; The Telecoms; Aerospace; The Internet: Denial of Service Attacks; McAfee
The Internet: Manipulating TrafficThreat Inflation; Conflicts of Interest; Part III - The Futility of Offensive Solutions; The Quandary of Attribution; Achieving Anonymity Online; The Origins of Tor; The Folly of Attribution; Deterrence; Arms Control Treaties; Shades of Orwell; The Golden Age of Surveillance; The NSA's MUSCULAR project; Opting Into Surveillance; The DHS Monitors Social Media; Corporate Compliance; The Hemisphere Project; A Global Panopticon; Coda: Extorting Privacy; Part IV - The Road to Cyber-Security; The Origins of Cyber-Insecurity; A Layered Perspective; Exciting Causes
The Software DepressionPredisposing Causes; Remote Causes; Security for The 1%; Cyber-Security for The 99 Percent; Building Resilient Software; Echoes of Ken Thompson; International Cooperation; Managing Externalities; Catch-22; Strength in Numbers; The Hazards of a Misdiagnosis; Securitization In-Depth; Threat Inflation; The Folly of Deterrence; In Search of Enemies; American Hypocrisy; Subverting Attribution; Turning to Big Brother; Root Causes of Cyber-Insecurity; Cyber-Security for the 1%; Cyber-Security for the 99%; Index
Record Nr. UNINA-9910786684903321
Blunden Bill  
Walterville, OR : , : Trine Day, , [2014]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Behold a pale farce : cyberwar, threat inflation, & the malware industrial complex / / Bill Blunden, Violet Cheung
Behold a pale farce : cyberwar, threat inflation, & the malware industrial complex / / Bill Blunden, Violet Cheung
Autore Blunden Bill
Pubbl/distr/stampa Walterville, OR : , : Trine Day, , [2014]
Descrizione fisica 1 online resource (835 p.)
Disciplina 355.343
Soggetto topico Information warfare
Computer security - United States
ISBN 1-937584-81-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto CoverImage; Title Page; Copyright page; Dedication; Epigraph; Table of Contents; Media Massage; Firsthand Experience; The Public Relations Industry; Behold a Pale Farce; Organization; Acknowledgments; The Wonder of it All; Part I - Rampant Hyperbole; A Backdrop of Metaphors; Never Mind: False Alarm; The Madness of Crowds; An Electronic Pearl Harbor; A Cyber-Katrina; The Hiroshima of Cyberwar; A Cyber 9/11; Dissenting Voices; The Executive Responds; Stuxnet; Plan X; Presidential Policy Directive 20; Hacking Foreign Targets for Years; Oz the Great and Powerful; Our Frenemy in Asia
A Plurality of ActorsRule of Law Breaks Down; The Internet's Frontier Town; Opposing Models for Reform; The Extent of China's Capabilities; Joined at the Hip; Both Sides Keep the Other in Business; The #1 Threat to Economic Security?; Cyberwar as a Misdiagnosis; Dialing 911; Looking Ahead; Part II - A Series of Unfortunate Events; Cybercrime; The Ecosystem; A Snapshot of Cybercrime; The TJX Hack; The Heartland Payment Systems Breach; The DarkMarket Sting; The RBS WorldPay Attack; The Return of the Analyzer; The Ballad of Max Butler; Sony under Siege; The FIS Breach; The Big Picture
The Punch LineEspionage; Moonlight Maze; Titan Rain; Operation Byzantine Hades; GhostNet; Joint Strike Fighter Breach; Operation Aurora; Shadows in the Cloud; Night Dragon; RSA and SecurID; Operation Shady RAT; The Nitro Attacks; Targeting Certificate Authorities; Operation Red October; Patterns Emerge; The Scope of U.S. Espionage; The Malware-Industrial Complex; Independent Operators; Spies Abound ...; But Some Groups Spy More Than Others; The Infrastructure; The Financial System; The Power Grid; The Telecoms; Aerospace; The Internet: Denial of Service Attacks; McAfee
The Internet: Manipulating TrafficThreat Inflation; Conflicts of Interest; Part III - The Futility of Offensive Solutions; The Quandary of Attribution; Achieving Anonymity Online; The Origins of Tor; The Folly of Attribution; Deterrence; Arms Control Treaties; Shades of Orwell; The Golden Age of Surveillance; The NSA's MUSCULAR project; Opting Into Surveillance; The DHS Monitors Social Media; Corporate Compliance; The Hemisphere Project; A Global Panopticon; Coda: Extorting Privacy; Part IV - The Road to Cyber-Security; The Origins of Cyber-Insecurity; A Layered Perspective; Exciting Causes
The Software DepressionPredisposing Causes; Remote Causes; Security for The 1%; Cyber-Security for The 99 Percent; Building Resilient Software; Echoes of Ken Thompson; International Cooperation; Managing Externalities; Catch-22; Strength in Numbers; The Hazards of a Misdiagnosis; Securitization In-Depth; Threat Inflation; The Folly of Deterrence; In Search of Enemies; American Hypocrisy; Subverting Attribution; Turning to Big Brother; Root Causes of Cyber-Insecurity; Cyber-Security for the 1%; Cyber-Security for the 99%; Index
Record Nr. UNINA-9910814722503321
Blunden Bill  
Walterville, OR : , : Trine Day, , [2014]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
CIA : culto e mistica del servizio segreto / Victor Marchetti, John D. Marks
CIA : culto e mistica del servizio segreto / Victor Marchetti, John D. Marks
Autore Marchetti, Victor
Pubbl/distr/stampa Milano : Garzanti, 1976
Descrizione fisica 382 p. ; 18 cm
Disciplina 355.343
Altri autori (Persone) Marks, John D.author
Collana I Garzanti
Soggetto topico Central intelligence agency
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione ita
Record Nr. UNISALENTO-991001193379707536
Marchetti, Victor  
Milano : Garzanti, 1976
Materiale a stampa
Lo trovi qui: Univ. del Salento
Opac: Controlla la disponibilità qui
CIA above the law? : secret detentions and unlawful inter-state transfers of detainees in Europe
CIA above the law? : secret detentions and unlawful inter-state transfers of detainees in Europe
Pubbl/distr/stampa Strasbourg : Council of Europe, 2088
Descrizione fisica 301 p. ; 24 cm
Disciplina 355.343
Soggetto topico Diritti umani - Violazione [da parte della] Central Intelligence Agency - Europa
ISBN 978-92-871-6419-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-990003210790203316
Strasbourg : Council of Europe, 2088
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cognitive superiority : information to power / / Dean S. Hartley III, Kenneth O. Jobson
Cognitive superiority : information to power / / Dean S. Hartley III, Kenneth O. Jobson
Autore Hartley Dean S., III
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (XXIV, 308 p. 65 illus., 62 illus. in color.)
Disciplina 355.343
Soggetto topico Information warfare
Military intelligence
ISBN 3-030-60184-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1: Introduction – Humans and their Matrix -- Chapter 2: The Technium – Tools and Targets of the Conflicts -- Chapter 3: The Noosphere -- Chapter 4: The Target – Humans -- Chapter 5: The Technium – Plus, Redux -- Chapter 6: The adversarial Environment -- Chapter 7: Engagement -- Chapter 8: Conclusion -- Appendix -- Glossary of Selected Terms -- Bibliography -- Index.
Record Nr. UNINA-9910483641303321
Hartley Dean S., III  
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cognitive Superiority : Information to Power / / by Dean S. Hartley III, Kenneth O. Jobson
Cognitive Superiority : Information to Power / / by Dean S. Hartley III, Kenneth O. Jobson
Autore Hartley Dean S., III
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Descrizione fisica 1 online resource (XXIV, 308 p. 65 illus., 62 illus. in color.)
Disciplina 355.343
Soggetto topico Politics and war
Data protection
Artificial intelligence
Psychology
Mass Media
Military and Defence Studies
Data and Information Security
Artificial Intelligence
Cyberpsychology
ISBN 9783030601843
3030601846
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1: Introduction – Humans and their Matrix -- Chapter 2: The Technium – Tools and Targets of the Conflicts -- Chapter 3: The Noosphere -- Chapter 4: The Target – Humans -- Chapter 5: The Technium – Plus, Redux -- Chapter 6: The adversarial Environment -- Chapter 7: Engagement -- Chapter 8: Conclusion -- Appendix -- Glossary of Selected Terms -- Bibliography -- Index.
Record Nr. UNINA-9910863146903321
Hartley Dean S., III  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyberwar and information warfare [[electronic resource] /] / edited by Daniel Ventre
Cyberwar and information warfare [[electronic resource] /] / edited by Daniel Ventre
Autore Ventre Daniel
Edizione [1st edition]
Pubbl/distr/stampa London, : ISTE
Descrizione fisica 1 online resource (434 p.)
Disciplina 355.3/43
355.343
Altri autori (Persone) VentreDaniel
Collana ISTE
Soggetto topico Information warfare
Psychological warfare
Computer crimes
Soggetto genere / forma Electronic books.
ISBN 1-118-60348-6
1-299-18789-7
1-118-60339-7
1-118-60351-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Cyberwar and Information Warfare; Title Page; Copyright Page; Table of Contents; Introduction; List of Acronyms; Chapter 1. Cyberwar and its Borders; 1.1. The seduction of cyberwar; 1.2. Desirable, vulnerable and frightening information; 1.3. Conflict and its dimensions; 1.4. The Helm and space; 1.5. Between knowledge and violence; 1.6. Space, distance and paths; 1.7. The permanency of war; 1.8. No war without borders; 1.9. The enemy and the sovereign; 1.10. Strengths and weaknesses; 1.11. Bibliography; Chapter 2. War of Meaning, Cyberwar and Democracies; 2.1. Introduction
2.2. Informational environment, a new operating space for strategy2.2.1. War and information: stakes for the West; 2.2.2. Strategy in the information environment; 2.2.3. Winning the battle of legitimacies; 2.3. Influence strategy: defeating and limiting armed force physical involvement; 2.3.1. Describing the aggressor; 2.3.2. Armed forces and the information environment; 2.3.3. The need for moral force; 2.4. Conclusion; 2.5. Bibliography; Chapter 3. Intelligence, the First Defense? Information Warfare and Strategic Surprise; 3.1. Information warfare, information and war
3.2. Intelligence and strategic surprise3.2.1. Strategic surprise; 3.2.2. Perception of surprise; 3.2.3. Perception of the possibility of surprise; 3.3. Strategic surprise and information warfare; 3.4. Concluding remarks: surprise in strategic studies; 3.5. Bibliography; Chapter 4. Cyberconflict: Stakes of Power; 4.1. Stakes of power; 4.1.1. Power relations; 4.1.2. Expression of sovereignty; 4.1.3. Cyberpower; 4.1.4. Measuring and locating power; 4.1.5. Limits of exercising power; 4.1.6. The Monroe doctrine; 4.1.7. Globalization; 4.1.8. Shock theories; 4.1.9. Naval and maritime power strategy
4.1.10. Air/space and cybernetic power: analogies4.1.11. Cyberconflict/cyber weapons, chemical/biological weapons: comparisons; 4.1.12. Cyberconflict/cyber weapons, Cold War, nuclear weapons: comparisons; 4.1.13. Cyberconflict and new wars; 4.2. The Stuxnet affair; 4.3. Bibliography; Chapter 5. Operational Aspects of a Cyberattack: Intelligence, Planning and Conduct; 5.1. Introduction; 5.2. Towards a broader concept of cyberwar; 5.2.1. War and cyberwar: common ground; 5.2.2. New orders in cyberwar; 5.2.3. Who are cyberwarriors?; 5.2.4. Is formalization possible?
5.3. Concept of critical infrastructure5.3.1. Generalized definition of the notion of critical infrastructure; 5.3.2. System interdependence; 5.4. Different phases of a cyberattack; 5.4.1. Intelligence phase; 5.4.2. Planning phase; 5.4.3. Conduct phase; 5.5. A few "elementary building blocks"; 5.5.1. General tactical framework; 5.5.2. Attacks on people; 5.5.3. Opinion manipulation and area control; 5.5.4. Military computer attack in a conventional operation; 5.6. Example scenario; 5.6.1. Tactical scenario; 5.6.2. The order of events; 5.6.3. Analysis; 5.7. Conclusion; 5.8. Bibliography
Chapter 6. Riots in Xinjiang and Chinese Information Warfare
Record Nr. UNINA-9910141487803321
Ventre Daniel  
London, : ISTE
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui