Battle-wise : seeking time-information superiority in networked warfare / / David C. Gompert, Irving Lachow, and Justin Perkins ; foreword by Raymond C. Smith ; afterword by Linton Wells II
| Battle-wise : seeking time-information superiority in networked warfare / / David C. Gompert, Irving Lachow, and Justin Perkins ; foreword by Raymond C. Smith ; afterword by Linton Wells II |
| Autore | Gompert David C. |
| Pubbl/distr/stampa | Washington, District of Columbia : , : Published for the Center for Technology and National Security Policy by National Defense University Press, , 2006 |
| Descrizione fisica | 1 online resource (193 p.) |
| Disciplina | 355.3/30410973 |
| Soggetto topico |
Command and control systems - United States
Military art and science - Automation Computer networks - United States Operational art (Military science) Information warfare - United States |
| Soggetto genere / forma | Electronic books. |
| ISBN | 0-16-092035-3 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
""Book Title""; ""Contents""; ""Foreword""; ""Preface""; ""Acknowledgments""; ""Chapter One: From Firepower to Information Power to Brainpower""; ""Chapter Two: Cognitive Demands of Networked Warfare""; ""Chapter Three: Beyond the Networking Advantage""; ""Chapter Four: Defeating Networked Adversaries""; ""Chapter Five: Integrating Intuition and Reasoning in Action""; ""Chapter Six: From Networking Power to Cognitive Power""; ""Chapter Seven: An Excursion beyond the Military""; ""Chapter Eight: Creating a Battle-Wise Force""; ""Chapter Nine: Recommendations and Conclusions""; ""Afterword""
""Glossary of Key Concepts""""About the Authors"" |
| Record Nr. | UNINA-9910453955103321 |
Gompert David C.
|
||
| Washington, District of Columbia : , : Published for the Center for Technology and National Security Policy by National Defense University Press, , 2006 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Battle-wise : seeking time-information superiority in networked warfare / / David C. Gompert, Irving Lachow, and Justin Perkins ; foreword by Raymond C. Smith ; afterword by Linton Wells II
| Battle-wise : seeking time-information superiority in networked warfare / / David C. Gompert, Irving Lachow, and Justin Perkins ; foreword by Raymond C. Smith ; afterword by Linton Wells II |
| Autore | Gompert David C. |
| Pubbl/distr/stampa | Washington, District of Columbia : , : Published for the Center for Technology and National Security Policy by National Defense University Press, , 2006 |
| Descrizione fisica | 1 online resource (193 p.) |
| Disciplina | 355.3/30410973 |
| Soggetto topico |
Command and control systems - United States
Military art and science - Automation Computer networks - United States Operational art (Military science) Information warfare - United States |
| ISBN | 0-16-092035-3 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
""Book Title""; ""Contents""; ""Foreword""; ""Preface""; ""Acknowledgments""; ""Chapter One: From Firepower to Information Power to Brainpower""; ""Chapter Two: Cognitive Demands of Networked Warfare""; ""Chapter Three: Beyond the Networking Advantage""; ""Chapter Four: Defeating Networked Adversaries""; ""Chapter Five: Integrating Intuition and Reasoning in Action""; ""Chapter Six: From Networking Power to Cognitive Power""; ""Chapter Seven: An Excursion beyond the Military""; ""Chapter Eight: Creating a Battle-Wise Force""; ""Chapter Nine: Recommendations and Conclusions""; ""Afterword""
""Glossary of Key Concepts""""About the Authors"" |
| Record Nr. | UNINA-9910661412403321 |
Gompert David C.
|
||
| Washington, District of Columbia : , : Published for the Center for Technology and National Security Policy by National Defense University Press, , 2006 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Brandishing cyberattack capabilities / / Martin C. Libicki
| Brandishing cyberattack capabilities / / Martin C. Libicki |
| Autore | Libicki Martin C |
| Pubbl/distr/stampa | Santa Monica, CA : , : Rand National Defense Research Institute, , 2013 |
| Descrizione fisica | 1 online resource (46 pages) |
| Soggetto topico |
Information warfare - United States
Cyberterrorism - United States - Prevention Computer networks - Security measures - United States Cyberspace - Security measures - United States Computer networks - Security measures - Government policy - United States |
| ISBN | 0-8330-8004-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910219973803321 |
Libicki Martin C
|
||
| Santa Monica, CA : , : Rand National Defense Research Institute, , 2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Building castles on sand? : ignoring the riptide of information operations / / Carla D. Bass
| Building castles on sand? : ignoring the riptide of information operations / / Carla D. Bass |
| Autore | Bass Carla D |
| Pubbl/distr/stampa | Maxwell Air Force Base, Ala. : , : Air War College, Air University, , [1998] |
| Collana | Air War College, Maxwell Paper |
| Soggetto topico |
Information technology - Military aspects - United States
Information warfare - United States |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | Ignoring the riptide of information operations |
| Record Nr. | UNINA-9910698242403321 |
Bass Carla D
|
||
| Maxwell Air Force Base, Ala. : , : Air War College, Air University, , [1998] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
China's cyber power and America's national security [[electronic resource] /] / by Jayson M. Spade ; edited by Jeffrey L. Caton
| China's cyber power and America's national security [[electronic resource] /] / by Jayson M. Spade ; edited by Jeffrey L. Caton |
| Autore | Spade Jayson M |
| Pubbl/distr/stampa | Carlisle Barracks, Penn. : , : U.S. Army War College, , [2012] |
| Descrizione fisica | 1 online resource (viii unnumbered pages, 71 pages) |
| Altri autori (Persone) | CatonJeffrey L |
| Soggetto topico |
Information warfare - China
Information warfare - United States Cyberterrorism - China Computer networks - China Computer networks - Security measures - United States National security - United States |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | Information as power |
| Record Nr. | UNINA-9910702158803321 |
Spade Jayson M
|
||
| Carlisle Barracks, Penn. : , : U.S. Army War College, , [2012] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Crafting an information warfare and counter-propaganda strategy for the emerging security environment : hearing before the Subcommittee on Emerging Threats and Capabilities of the Committee on Armed Services, House of Representatives, One Hundred Fifteenth Congress, first session, hearing held March 15, 2017
| Crafting an information warfare and counter-propaganda strategy for the emerging security environment : hearing before the Subcommittee on Emerging Threats and Capabilities of the Committee on Armed Services, House of Representatives, One Hundred Fifteenth Congress, first session, hearing held March 15, 2017 |
| Pubbl/distr/stampa | Washington : , : U.S. Government Publishing Office, , 2017 |
| Descrizione fisica | 1 online resource (iii, 84 pages) |
| Soggetto topico |
Cyberspace operations (Military science) - United States
Cyberspace - Security measures - United States Information warfare - United States Psychological warfare - United States Military planning - United States National security - United States |
| Soggetto genere / forma | Legislative hearings. |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | Crafting an information warfare and counter-propaganda strategy for the emerging security environment |
| Record Nr. | UNINA-9910706178503321 |
| Washington : , : U.S. Government Publishing Office, , 2017 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Crisis and escalation in cyberspace / / Martin C. Libicki
| Crisis and escalation in cyberspace / / Martin C. Libicki |
| Autore | Libicki Martin C |
| Pubbl/distr/stampa | Santa Monica, CA : , : RAND, Project Air Force, , 2012 |
| Descrizione fisica | 1 online resource (279 p.) |
| Disciplina | 358.4/141 |
| Soggetto topico |
Information warfare - United States
Escalation (Military science) Cyberspace - Security measures Crisis management - Government policy - United States Cyberterrorism - Prevention Conflict management |
| Soggetto genere / forma | Electronic books. |
| ISBN |
0-8330-7679-5
0-8330-7680-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Avoiding crises by creating norms -- Narratives, dialogues, and signaling -- Escalation management -- Strategic stability -- Conclusions and recommendations for the Air Force -- Introduction -- Some hypothetical crises -- Mutual mistrust is likely to characterize a cyber crisis -- States may have room for maneuver in a cyber crisis -- A note on methodology -- Purpose and organization -- Avoiding crises by creating norms -- What kind of norms might be useful? -- Enforce laws against hacking -- Disassociate from freelance hackers -- Discourage commercial espionage -- Be careful about the obligation to suppress cyber traffic -- How do we enforce norms? -- Confidence-building measures -- Norms for victims of cyberattacks -- Norms for war? -- Deception -- Military necessity and collateral damage -- Proportionality -- Reversibility -- Conclusions -- Narratives, dialogue, and signals -- Narratives to promote control -- A narrative framework for cyberspace -- Victimization, attribution, retaliation, and aggression -- Victimization -- Attribution -- Retaliation -- Aggression -- Emollients: narratives to walk back a crisis -- We did nothing -- Well, at least not on our orders -- It was an accident -- This is nothing new -- At least it does not portend anything -- Broader considerations -- Signals -- Ambiguity in signaling -- Signaling resolve -- Signaling that cyber combat is not kinetic combat -- Conclusions -- Escalation management -- Motives for escalation -- Does escalation matter? -- Escalation risks -- Escalation risks in phase -- Escalation risks for contained local conflicts -- Escalation risks for uncontained conflicts -- Managing proxy cyberattacks -- What hidden combatants imply for horizontal escalation -- Managing overt proxy conflict -- The difficulties of tit-for-tat management -- The importance of pre-planning -- Disjunctions among effort, effect, and perception -- Inadvertent escalation -- Escalation into kinetic warfare -- Escalation into economic warfare -- Sub rosa escalation -- Managing the third-party problem -- The need for a clean shot -- Inference and narrative -- Command and control -- Commanders -- Those they command -- Conclusions -- Implications for strategic stability -- Translating sources of cold war instability to cyberspace -- What influence can cyberwar have if nuclear weapons exist? -- Can cyberwar disarm another state's nuclear capabilities? -- Can cyberwar disarm another states cyberwarriors? -- Does cyberwar lend itself to alert-reaction cycles? -- Are cyberdefenses inherently destabilizing? -- Would a cyberspace arms races be destabilizing? -- Misperception as a source of crisis -- Side takes great exception to cyberespionage -- Defenses are misinterpreted as preparations for war -- Too much confidence in attribution -- Too much confidence in or fear of pre-emption -- Supposedly risk-free cyberattacks -- Neutrality -- Conclusions -- Can cyber crises be managed? -- A. Distributed denial-of-service attacks -- B. Overt, obvious, and covert cyberattacks and responses -- Can good cyberdefenses discourage attacks? -- Bibliography -- Figures -- Figure 1: Alternative postures for a master cyber narrative -- Figure 2: Sources of imprecision in tit for tat -- Figure 3: An inadvertent path to mutual escalation -- Figure A-1: Configuring networks to limit the damage of DDoS attacks -- Table -- Overt, obvious, and covert cyberattacks and responses. |
| Record Nr. | UNINA-9910219977703321 |
Libicki Martin C
|
||
| Santa Monica, CA : , : RAND, Project Air Force, , 2012 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Critical infrastructure protection [[electronic resource] ] : federal efforts require a more coordinated and comprehensive approach for protecting information systems
| Critical infrastructure protection [[electronic resource] ] : federal efforts require a more coordinated and comprehensive approach for protecting information systems |
| Pubbl/distr/stampa | [Washington, D.C.] : , : U.S. General Accounting Office, , [2002] |
| Soggetto topico |
Electronic data processing - Security measures - United States
Telecommunication - Defense measures - United States Computer networks - Security measures - United States Information warfare - United States |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | Critical Infrastructure Protection |
| Record Nr. | UNINA-9910693799303321 |
| [Washington, D.C.] : , : U.S. General Accounting Office, , [2002] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cyber operations today : preparing for 21st century challenges in an information-enabled society : Committee on Armed Services, House of Representatives, One Hundred Fifteenth Congress, second session, hearing held April 11, 2018
| Cyber operations today : preparing for 21st century challenges in an information-enabled society : Committee on Armed Services, House of Representatives, One Hundred Fifteenth Congress, second session, hearing held April 11, 2018 |
| Pubbl/distr/stampa | Washington : , : U.S. Government Publishing Office, , 2019 |
| Descrizione fisica | 1 online resource (iii, 83 pages) |
| Soggetto topico |
Cyberspace operations (Military science) - United States
Information warfare - United States Computer security - United States Cyberterrorism - United States - Prevention - Planning Computer security Cyberspace operations (Military science) Information warfare |
| Soggetto genere / forma | Legislative hearings. |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | Cyber operations today |
| Record Nr. | UNINA-9910711952103321 |
| Washington : , : U.S. Government Publishing Office, , 2019 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cyber warfare : a documentary and reference guide / / Paul J. Springer
| Cyber warfare : a documentary and reference guide / / Paul J. Springer |
| Pubbl/distr/stampa | Santa Barbara, California : , : Greenwood, an imprint of ABC-CLIO, , [2020] |
| Descrizione fisica | 1 online resource (xvii, 357 pages) |
| Disciplina | 355.4 |
| Collana | Documentary and reference guides |
| Soggetto topico |
Cyberspace operations (Military science) - United States
Cyberspace - Government policy - United States Information warfare - United States |
| ISBN |
979-84-00-63647-9
979-82-16-07053-5 1-4408-7279-1 |
| Classificazione | 355.425 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | 1. U.S. cyber strategy documents -- 2. U.S. assessments of cyber adversaries -- 3. U.S. policies, doctrine, and reports -- 4. Non-U.S. strategy and documents -- 5. Speeches, testimony, and transcripts. |
| Record Nr. | UNINA-9910794058603321 |
| Santa Barbara, California : , : Greenwood, an imprint of ABC-CLIO, , [2020] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||