top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
"Little green men": a primer on modern Russian unconventional warfare, Ukraine 2013-2014
"Little green men": a primer on modern Russian unconventional warfare, Ukraine 2013-2014
Pubbl/distr/stampa Fort Bragg, North Carolina : , : United States Army Special Operations Command, , 2015
Descrizione fisica 1 online resource (67 pages) : illustrations (chiefly color), color maps
Soggetto topico Irregular warfare - Ukraine
Irregular warfare - Russia (Federation)
Information warfare - Russia (Federation)
Diplomatic relations
Information warfare
Irregular warfare
Military policy
Military relations
Strategic aspects of individual places
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti "Little green men"
Record Nr. UNINA-9910709996503321
Fort Bragg, North Carolina : , : United States Army Special Operations Command, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
.. International Conference on Cyber Conflict
.. International Conference on Cyber Conflict
Pubbl/distr/stampa Piscataway, NJ : , : IEEE
Disciplina 355.3
Soggetto topico Information warfare
Cyberterrorism - Prevention
Cyberinfrastructure - Security measures
Computer security
Computer networks - Security measures
Soggetto genere / forma Conference papers and proceedings.
Formato Materiale a stampa
Livello bibliografico Periodico
Lingua di pubblicazione eng
Altri titoli varianti ICCC ..
Record Nr. UNISA-996280297203316
Piscataway, NJ : , : IEEE
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
.. International Conference on Cyber Conflict
.. International Conference on Cyber Conflict
Pubbl/distr/stampa Piscataway, NJ : , : IEEE
Disciplina 355.3
Soggetto topico Information warfare
Cyberterrorism - Prevention
Cyberinfrastructure - Security measures
Computer security
Computer networks - Security measures
Soggetto genere / forma Conference papers and proceedings.
Formato Materiale a stampa
Livello bibliografico Periodico
Lingua di pubblicazione eng
Altri titoli varianti ICCC ..
Record Nr. UNINA-9910626012003321
Piscataway, NJ : , : IEEE
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
.. International Conference on Cyber Conflict
.. International Conference on Cyber Conflict
Pubbl/distr/stampa Piscataway, NJ : , : IEEE
Disciplina 355.3
Soggetto topico Information warfare
Cyberterrorism - Prevention
Cyberinfrastructure - Security measures
Computer security
Computer networks - Security measures
Soggetto genere / forma Conference papers and proceedings.
Formato Materiale a stampa
Livello bibliografico Periodico
Lingua di pubblicazione eng
Altri titoli varianti ICCC ..
Record Nr. UNISA-996581126103316
Piscataway, NJ : , : IEEE
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
1998 IEEE Information Technology Conference : information environment for the future; showcasing leading edge information technologies, systems and strategies to meet military and commercial needs in the evolving information environment
1998 IEEE Information Technology Conference : information environment for the future; showcasing leading edge information technologies, systems and strategies to meet military and commercial needs in the evolving information environment
Pubbl/distr/stampa [Place of publication not identified], : IEEE, 1998
Disciplina 303.48/33
Soggetto topico Information technology
Multisensor data fusion
Computer simulation
Expert systems (Computer science)
Information warfare
Electrical & Computer Engineering
Engineering & Applied Sciences
Information Technology
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996215172103316
[Place of publication not identified], : IEEE, 1998
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Armed conflict in the 21st century : the information revolution and post-modern warfare
Armed conflict in the 21st century : the information revolution and post-modern warfare
Autore Metz Steven
Pubbl/distr/stampa [Place of publication not identified], : Strategic Studies Institute U S Army War College, 2000
Disciplina 355.3/43
Soggetto topico War - Forecasting - United States
War - Effect of technology on
Warfare, Conventional - Forecasting
Information warfare
Military doctrine
Twenty-first century
Military Science - General
Military & Naval Science
Law, Politics & Government
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910689332603321
Metz Steven  
[Place of publication not identified], : Strategic Studies Institute U S Army War College, 2000
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The art of war in the network age : back to the future / / Joseph Henrotin
The art of war in the network age : back to the future / / Joseph Henrotin
Autore Henrotin Joseph
Edizione [1st edition]
Pubbl/distr/stampa Hoboken, New Jersey : , : ISTE Ltd/John Wiley and Sons Inc, , 2016
Descrizione fisica 1 online resource (243 pages) : illustrations
Collana Information systems, web and pervasive computing series. Intellectual technologies set
THEi Wiley ebooks
Soggetto topico Military art and science - Technological innovations
Information warfare
Cyberspace operations (Military science)
ISBN 1-119-36131-1
1-119-36134-6
1-119-36135-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910136476603321
Henrotin Joseph  
Hoboken, New Jersey : , : ISTE Ltd/John Wiley and Sons Inc, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The art of war in the network age : back to the future / / Joseph Henrotin
The art of war in the network age : back to the future / / Joseph Henrotin
Autore Henrotin Joseph
Edizione [1st edition]
Pubbl/distr/stampa Hoboken, New Jersey : , : ISTE Ltd/John Wiley and Sons Inc, , 2016
Descrizione fisica 1 online resource (243 pages) : illustrations
Collana Information systems, web and pervasive computing series. Intellectual technologies set
THEi Wiley ebooks
Soggetto topico Military art and science - Technological innovations
Information warfare
Cyberspace operations (Military science)
ISBN 1-119-36131-1
1-119-36134-6
1-119-36135-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910823395403321
Henrotin Joseph  
Hoboken, New Jersey : , : ISTE Ltd/John Wiley and Sons Inc, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The basics of cyber warfare [[electronic resource] ] : understanding the fundamentals of cyber warfare in theory and practice / / Steve Winterfield, Jason Andress
The basics of cyber warfare [[electronic resource] ] : understanding the fundamentals of cyber warfare in theory and practice / / Steve Winterfield, Jason Andress
Autore Winterfeld Steve
Edizione [1st edition]
Pubbl/distr/stampa Boston, : Syngress, c2013
Descrizione fisica 1 online resource (169 p.)
Disciplina 005.8
Altri autori (Persone) AndressJason
Collana Syngress basics series The basics of cyber warfare
Soggetto topico Internet - Security measures
Computer networks - Security measures
Information warfare
Soggetto genere / forma Electronic books.
ISBN 1-283-81084-0
0-12-405181-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Half Title; Title page; Copyright; Dedication; Contents; Author Biography; Introduction; 1 Cyber Threatscape; How Did We Get Here?; Attack Methodology Plus Tools/Techniques Used; Attackers (The Types of Threats); How Most Organizations Defend Today (Defensive Mountain Range)?; Targeted Capabilities (What We Should be Defending); Summary; References; 2 Cyberspace Battlefield Operations; What is Cyber Warfare?; Definition for Cyber Warfare; Tactical and Operational Reasons for Cyber War; Cyber Strategy and Power; Cyber Arms Control; Cyber War-Hype or Reality; Boundaries in Cyber Warfare
Defense in DepthComputer Controlled Infrastructure; Organizational View; Where Cyber Fits in the War-Fighting Domains; Land; Sea; Air; Space; Cyber Domain; Summary; References; 3 Cyber Doctrine; Current US Doctrine; US Forces; US Air Force; US Navy; US Army; DoD INFOCONs; Sample Doctrine / Strategy From Around the World; Chinese Doctrine; Other Asian countries; European Countries; Private or Mercenary Armies; Some Key Military Principles that Must be Adapted to Cyber Warfare; Intelligence Preparation of the Operational Environment (IPOE); Joint Munitions Effectiveness Manual (JMEM)
Measures of Effectiveness (MOE)Battle Damage Assessment (BDA); Close Air Support (CAS); Counterinsurgency (COIN); Summary; References; 4 Tools and Techniques; Logical Weapons; Reconnaissance Tools; Scanning Tools; Access and Escalation Tools; Exfiltration Tools; Sustainment Tools; Assault Tools; Obfuscation Tools; Physical Weapons; How the Logical and Physical Realms are Connected; Logical Systems Run on Physical Hardware; Logical Attacks Can Have Physical Effects; Infrastructure Concerns; What is SCADA?; What Security Issues are Present in the World of SCADA?
What are the Consequences of SCADA Failures?Supply Chain Concerns; Compromised Hardware; Deliberately Corrupted Components; Non-Technical Issues; Tools for Physical Attack and Defense; Electromagnetic Attacks; Electromagnetic Pulse (EMP) Weapons; Jamming; Defense Against Conventional Attacks; Summary; References; 5 Offensive Tactics and Procedures; Computer Network Exploitation; Intelligence and Counter-Intelligence; Reconnaissance; Open Source Intelligence; Passive Reconnaissance; Surveillance; Voice Surveillance; Data Surveillance; Large Scale Surveillance Programs
Uses of Surveillance DataComputer Network Attack; Waging War in the Cyber Era; Physical Warfare; Electronic Warfare; Logical Warfare; Reactive vs Proactive Attacks; The Attack Process; Recon; Scan; Access; Escalate; Exfiltrate; Assault; Sustain; Obfuscate; Summary; References; 6 Psychological Weapons; Social Engineering Explained; Is Social Engineering science?; SE Tactics Techniques and Procedures (TTPs); Types of SE approaches; Types of SE methodologies; How the Military Approaches Social Engineering; Army Doctrine; How the Military Defends against Social Engineering; How the Army Does CI
An Air Force Approach
Record Nr. UNINA-9910462134603321
Winterfeld Steve  
Boston, : Syngress, c2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The basics of cyber warfare [[electronic resource] ] : understanding the fundamentals of cyber warfare in theory and practice / / Steve Winterfield, Jason Andress
The basics of cyber warfare [[electronic resource] ] : understanding the fundamentals of cyber warfare in theory and practice / / Steve Winterfield, Jason Andress
Autore Winterfeld Steve
Edizione [1st edition]
Pubbl/distr/stampa Boston, : Syngress, c2013
Descrizione fisica 1 online resource (169 p.)
Disciplina 005.8
Altri autori (Persone) AndressJason
Collana Syngress basics series The basics of cyber warfare
Soggetto topico Internet - Security measures
Computer networks - Security measures
Information warfare
ISBN 1-283-81084-0
0-12-405181-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Half Title; Title page; Copyright; Dedication; Contents; Author Biography; Introduction; 1 Cyber Threatscape; How Did We Get Here?; Attack Methodology Plus Tools/Techniques Used; Attackers (The Types of Threats); How Most Organizations Defend Today (Defensive Mountain Range)?; Targeted Capabilities (What We Should be Defending); Summary; References; 2 Cyberspace Battlefield Operations; What is Cyber Warfare?; Definition for Cyber Warfare; Tactical and Operational Reasons for Cyber War; Cyber Strategy and Power; Cyber Arms Control; Cyber War-Hype or Reality; Boundaries in Cyber Warfare
Defense in DepthComputer Controlled Infrastructure; Organizational View; Where Cyber Fits in the War-Fighting Domains; Land; Sea; Air; Space; Cyber Domain; Summary; References; 3 Cyber Doctrine; Current US Doctrine; US Forces; US Air Force; US Navy; US Army; DoD INFOCONs; Sample Doctrine / Strategy From Around the World; Chinese Doctrine; Other Asian countries; European Countries; Private or Mercenary Armies; Some Key Military Principles that Must be Adapted to Cyber Warfare; Intelligence Preparation of the Operational Environment (IPOE); Joint Munitions Effectiveness Manual (JMEM)
Measures of Effectiveness (MOE)Battle Damage Assessment (BDA); Close Air Support (CAS); Counterinsurgency (COIN); Summary; References; 4 Tools and Techniques; Logical Weapons; Reconnaissance Tools; Scanning Tools; Access and Escalation Tools; Exfiltration Tools; Sustainment Tools; Assault Tools; Obfuscation Tools; Physical Weapons; How the Logical and Physical Realms are Connected; Logical Systems Run on Physical Hardware; Logical Attacks Can Have Physical Effects; Infrastructure Concerns; What is SCADA?; What Security Issues are Present in the World of SCADA?
What are the Consequences of SCADA Failures?Supply Chain Concerns; Compromised Hardware; Deliberately Corrupted Components; Non-Technical Issues; Tools for Physical Attack and Defense; Electromagnetic Attacks; Electromagnetic Pulse (EMP) Weapons; Jamming; Defense Against Conventional Attacks; Summary; References; 5 Offensive Tactics and Procedures; Computer Network Exploitation; Intelligence and Counter-Intelligence; Reconnaissance; Open Source Intelligence; Passive Reconnaissance; Surveillance; Voice Surveillance; Data Surveillance; Large Scale Surveillance Programs
Uses of Surveillance DataComputer Network Attack; Waging War in the Cyber Era; Physical Warfare; Electronic Warfare; Logical Warfare; Reactive vs Proactive Attacks; The Attack Process; Recon; Scan; Access; Escalate; Exfiltrate; Assault; Sustain; Obfuscate; Summary; References; 6 Psychological Weapons; Social Engineering Explained; Is Social Engineering science?; SE Tactics Techniques and Procedures (TTPs); Types of SE approaches; Types of SE methodologies; How the Military Approaches Social Engineering; Army Doctrine; How the Military Defends against Social Engineering; How the Army Does CI
An Air Force Approach
Record Nr. UNINA-9910785913803321
Winterfeld Steve  
Boston, : Syngress, c2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui