"Little green men": a primer on modern Russian unconventional warfare, Ukraine 2013-2014 |
Pubbl/distr/stampa | Fort Bragg, North Carolina : , : United States Army Special Operations Command, , 2015 |
Descrizione fisica | 1 online resource (67 pages) : illustrations (chiefly color), color maps |
Soggetto topico |
Irregular warfare - Ukraine
Irregular warfare - Russia (Federation) Information warfare - Russia (Federation) Diplomatic relations Information warfare Irregular warfare Military policy Military relations Strategic aspects of individual places |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | "Little green men" |
Record Nr. | UNINA-9910709996503321 |
Fort Bragg, North Carolina : , : United States Army Special Operations Command, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
.. International Conference on Cyber Conflict |
Pubbl/distr/stampa | Piscataway, NJ : , : IEEE |
Disciplina | 355.3 |
Soggetto topico |
Information warfare
Cyberterrorism - Prevention Cyberinfrastructure - Security measures Computer security Computer networks - Security measures |
Soggetto genere / forma | Conference papers and proceedings. |
Formato | Materiale a stampa |
Livello bibliografico | Periodico |
Lingua di pubblicazione | eng |
Altri titoli varianti | ICCC .. |
Record Nr. | UNISA-996280297203316 |
Piscataway, NJ : , : IEEE | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
.. International Conference on Cyber Conflict |
Pubbl/distr/stampa | Piscataway, NJ : , : IEEE |
Disciplina | 355.3 |
Soggetto topico |
Information warfare
Cyberterrorism - Prevention Cyberinfrastructure - Security measures Computer security Computer networks - Security measures |
Soggetto genere / forma | Conference papers and proceedings. |
Formato | Materiale a stampa |
Livello bibliografico | Periodico |
Lingua di pubblicazione | eng |
Altri titoli varianti | ICCC .. |
Record Nr. | UNINA-9910626012003321 |
Piscataway, NJ : , : IEEE | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
.. International Conference on Cyber Conflict |
Pubbl/distr/stampa | Piscataway, NJ : , : IEEE |
Disciplina | 355.3 |
Soggetto topico |
Information warfare
Cyberterrorism - Prevention Cyberinfrastructure - Security measures Computer security Computer networks - Security measures |
Soggetto genere / forma | Conference papers and proceedings. |
Formato | Materiale a stampa |
Livello bibliografico | Periodico |
Lingua di pubblicazione | eng |
Altri titoli varianti | ICCC .. |
Record Nr. | UNISA-996581126103316 |
Piscataway, NJ : , : IEEE | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
1998 IEEE Information Technology Conference : information environment for the future; showcasing leading edge information technologies, systems and strategies to meet military and commercial needs in the evolving information environment |
Pubbl/distr/stampa | [Place of publication not identified], : IEEE, 1998 |
Disciplina | 303.48/33 |
Soggetto topico |
Information technology
Multisensor data fusion Computer simulation Expert systems (Computer science) Information warfare Electrical & Computer Engineering Engineering & Applied Sciences Information Technology |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996215172103316 |
[Place of publication not identified], : IEEE, 1998 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Armed conflict in the 21st century : the information revolution and post-modern warfare |
Autore | Metz Steven |
Pubbl/distr/stampa | [Place of publication not identified], : Strategic Studies Institute U S Army War College, 2000 |
Disciplina | 355.3/43 |
Soggetto topico |
War - Forecasting - United States
War - Effect of technology on Warfare, Conventional - Forecasting Information warfare Military doctrine Twenty-first century Military Science - General Military & Naval Science Law, Politics & Government |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910689332603321 |
Metz Steven | ||
[Place of publication not identified], : Strategic Studies Institute U S Army War College, 2000 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The art of war in the network age : back to the future / / Joseph Henrotin |
Autore | Henrotin Joseph |
Edizione | [1st edition] |
Pubbl/distr/stampa | Hoboken, New Jersey : , : ISTE Ltd/John Wiley and Sons Inc, , 2016 |
Descrizione fisica | 1 online resource (243 pages) : illustrations |
Collana |
Information systems, web and pervasive computing series. Intellectual technologies set
THEi Wiley ebooks |
Soggetto topico |
Military art and science - Technological innovations
Information warfare Cyberspace operations (Military science) |
ISBN |
1-119-36131-1
1-119-36134-6 1-119-36135-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910136476603321 |
Henrotin Joseph | ||
Hoboken, New Jersey : , : ISTE Ltd/John Wiley and Sons Inc, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The art of war in the network age : back to the future / / Joseph Henrotin |
Autore | Henrotin Joseph |
Edizione | [1st edition] |
Pubbl/distr/stampa | Hoboken, New Jersey : , : ISTE Ltd/John Wiley and Sons Inc, , 2016 |
Descrizione fisica | 1 online resource (243 pages) : illustrations |
Collana |
Information systems, web and pervasive computing series. Intellectual technologies set
THEi Wiley ebooks |
Soggetto topico |
Military art and science - Technological innovations
Information warfare Cyberspace operations (Military science) |
ISBN |
1-119-36131-1
1-119-36134-6 1-119-36135-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910823395403321 |
Henrotin Joseph | ||
Hoboken, New Jersey : , : ISTE Ltd/John Wiley and Sons Inc, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The basics of cyber warfare [[electronic resource] ] : understanding the fundamentals of cyber warfare in theory and practice / / Steve Winterfield, Jason Andress |
Autore | Winterfeld Steve |
Edizione | [1st edition] |
Pubbl/distr/stampa | Boston, : Syngress, c2013 |
Descrizione fisica | 1 online resource (169 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | AndressJason |
Collana | Syngress basics series The basics of cyber warfare |
Soggetto topico |
Internet - Security measures
Computer networks - Security measures Information warfare |
Soggetto genere / forma | Electronic books. |
ISBN |
1-283-81084-0
0-12-405181-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Half Title; Title page; Copyright; Dedication; Contents; Author Biography; Introduction; 1 Cyber Threatscape; How Did We Get Here?; Attack Methodology Plus Tools/Techniques Used; Attackers (The Types of Threats); How Most Organizations Defend Today (Defensive Mountain Range)?; Targeted Capabilities (What We Should be Defending); Summary; References; 2 Cyberspace Battlefield Operations; What is Cyber Warfare?; Definition for Cyber Warfare; Tactical and Operational Reasons for Cyber War; Cyber Strategy and Power; Cyber Arms Control; Cyber War-Hype or Reality; Boundaries in Cyber Warfare
Defense in DepthComputer Controlled Infrastructure; Organizational View; Where Cyber Fits in the War-Fighting Domains; Land; Sea; Air; Space; Cyber Domain; Summary; References; 3 Cyber Doctrine; Current US Doctrine; US Forces; US Air Force; US Navy; US Army; DoD INFOCONs; Sample Doctrine / Strategy From Around the World; Chinese Doctrine; Other Asian countries; European Countries; Private or Mercenary Armies; Some Key Military Principles that Must be Adapted to Cyber Warfare; Intelligence Preparation of the Operational Environment (IPOE); Joint Munitions Effectiveness Manual (JMEM) Measures of Effectiveness (MOE)Battle Damage Assessment (BDA); Close Air Support (CAS); Counterinsurgency (COIN); Summary; References; 4 Tools and Techniques; Logical Weapons; Reconnaissance Tools; Scanning Tools; Access and Escalation Tools; Exfiltration Tools; Sustainment Tools; Assault Tools; Obfuscation Tools; Physical Weapons; How the Logical and Physical Realms are Connected; Logical Systems Run on Physical Hardware; Logical Attacks Can Have Physical Effects; Infrastructure Concerns; What is SCADA?; What Security Issues are Present in the World of SCADA? What are the Consequences of SCADA Failures?Supply Chain Concerns; Compromised Hardware; Deliberately Corrupted Components; Non-Technical Issues; Tools for Physical Attack and Defense; Electromagnetic Attacks; Electromagnetic Pulse (EMP) Weapons; Jamming; Defense Against Conventional Attacks; Summary; References; 5 Offensive Tactics and Procedures; Computer Network Exploitation; Intelligence and Counter-Intelligence; Reconnaissance; Open Source Intelligence; Passive Reconnaissance; Surveillance; Voice Surveillance; Data Surveillance; Large Scale Surveillance Programs Uses of Surveillance DataComputer Network Attack; Waging War in the Cyber Era; Physical Warfare; Electronic Warfare; Logical Warfare; Reactive vs Proactive Attacks; The Attack Process; Recon; Scan; Access; Escalate; Exfiltrate; Assault; Sustain; Obfuscate; Summary; References; 6 Psychological Weapons; Social Engineering Explained; Is Social Engineering science?; SE Tactics Techniques and Procedures (TTPs); Types of SE approaches; Types of SE methodologies; How the Military Approaches Social Engineering; Army Doctrine; How the Military Defends against Social Engineering; How the Army Does CI An Air Force Approach |
Record Nr. | UNINA-9910462134603321 |
Winterfeld Steve | ||
Boston, : Syngress, c2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The basics of cyber warfare [[electronic resource] ] : understanding the fundamentals of cyber warfare in theory and practice / / Steve Winterfield, Jason Andress |
Autore | Winterfeld Steve |
Edizione | [1st edition] |
Pubbl/distr/stampa | Boston, : Syngress, c2013 |
Descrizione fisica | 1 online resource (169 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | AndressJason |
Collana | Syngress basics series The basics of cyber warfare |
Soggetto topico |
Internet - Security measures
Computer networks - Security measures Information warfare |
ISBN |
1-283-81084-0
0-12-405181-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Half Title; Title page; Copyright; Dedication; Contents; Author Biography; Introduction; 1 Cyber Threatscape; How Did We Get Here?; Attack Methodology Plus Tools/Techniques Used; Attackers (The Types of Threats); How Most Organizations Defend Today (Defensive Mountain Range)?; Targeted Capabilities (What We Should be Defending); Summary; References; 2 Cyberspace Battlefield Operations; What is Cyber Warfare?; Definition for Cyber Warfare; Tactical and Operational Reasons for Cyber War; Cyber Strategy and Power; Cyber Arms Control; Cyber War-Hype or Reality; Boundaries in Cyber Warfare
Defense in DepthComputer Controlled Infrastructure; Organizational View; Where Cyber Fits in the War-Fighting Domains; Land; Sea; Air; Space; Cyber Domain; Summary; References; 3 Cyber Doctrine; Current US Doctrine; US Forces; US Air Force; US Navy; US Army; DoD INFOCONs; Sample Doctrine / Strategy From Around the World; Chinese Doctrine; Other Asian countries; European Countries; Private or Mercenary Armies; Some Key Military Principles that Must be Adapted to Cyber Warfare; Intelligence Preparation of the Operational Environment (IPOE); Joint Munitions Effectiveness Manual (JMEM) Measures of Effectiveness (MOE)Battle Damage Assessment (BDA); Close Air Support (CAS); Counterinsurgency (COIN); Summary; References; 4 Tools and Techniques; Logical Weapons; Reconnaissance Tools; Scanning Tools; Access and Escalation Tools; Exfiltration Tools; Sustainment Tools; Assault Tools; Obfuscation Tools; Physical Weapons; How the Logical and Physical Realms are Connected; Logical Systems Run on Physical Hardware; Logical Attacks Can Have Physical Effects; Infrastructure Concerns; What is SCADA?; What Security Issues are Present in the World of SCADA? What are the Consequences of SCADA Failures?Supply Chain Concerns; Compromised Hardware; Deliberately Corrupted Components; Non-Technical Issues; Tools for Physical Attack and Defense; Electromagnetic Attacks; Electromagnetic Pulse (EMP) Weapons; Jamming; Defense Against Conventional Attacks; Summary; References; 5 Offensive Tactics and Procedures; Computer Network Exploitation; Intelligence and Counter-Intelligence; Reconnaissance; Open Source Intelligence; Passive Reconnaissance; Surveillance; Voice Surveillance; Data Surveillance; Large Scale Surveillance Programs Uses of Surveillance DataComputer Network Attack; Waging War in the Cyber Era; Physical Warfare; Electronic Warfare; Logical Warfare; Reactive vs Proactive Attacks; The Attack Process; Recon; Scan; Access; Escalate; Exfiltrate; Assault; Sustain; Obfuscate; Summary; References; 6 Psychological Weapons; Social Engineering Explained; Is Social Engineering science?; SE Tactics Techniques and Procedures (TTPs); Types of SE approaches; Types of SE methodologies; How the Military Approaches Social Engineering; Army Doctrine; How the Military Defends against Social Engineering; How the Army Does CI An Air Force Approach |
Record Nr. | UNINA-9910785913803321 |
Winterfeld Steve | ||
Boston, : Syngress, c2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|