Battle-wise : seeking time-information superiority in networked warfare / / David C. Gompert, Irving Lachow, and Justin Perkins ; foreword by Raymond C. Smith ; afterword by Linton Wells II |
Autore | Gompert David C. |
Pubbl/distr/stampa | Washington, District of Columbia : , : Published for the Center for Technology and National Security Policy by National Defense University Press, , 2006 |
Descrizione fisica | 1 online resource (193 p.) |
Disciplina | 355.3/30410973 |
Soggetto topico |
Command and control systems - United States
Military art and science - Automation Computer networks - United States Operational art (Military science) Information warfare - United States |
Soggetto genere / forma | Electronic books. |
ISBN | 0-16-092035-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
""Book Title""; ""Contents""; ""Foreword""; ""Preface""; ""Acknowledgments""; ""Chapter One: From Firepower to Information Power to Brainpower""; ""Chapter Two: Cognitive Demands of Networked Warfare""; ""Chapter Three: Beyond the Networking Advantage""; ""Chapter Four: Defeating Networked Adversaries""; ""Chapter Five: Integrating Intuition and Reasoning in Action""; ""Chapter Six: From Networking Power to Cognitive Power""; ""Chapter Seven: An Excursion beyond the Military""; ""Chapter Eight: Creating a Battle-Wise Force""; ""Chapter Nine: Recommendations and Conclusions""; ""Afterword""
""Glossary of Key Concepts""""About the Authors"" |
Record Nr. | UNINA-9910453955103321 |
Gompert David C. | ||
Washington, District of Columbia : , : Published for the Center for Technology and National Security Policy by National Defense University Press, , 2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Battle-wise : seeking time-information superiority in networked warfare / / David C. Gompert, Irving Lachow, and Justin Perkins ; foreword by Raymond C. Smith ; afterword by Linton Wells II |
Autore | Gompert David C. |
Pubbl/distr/stampa | Washington, District of Columbia : , : Published for the Center for Technology and National Security Policy by National Defense University Press, , 2006 |
Descrizione fisica | 1 online resource (193 p.) |
Disciplina | 355.3/30410973 |
Soggetto topico |
Command and control systems - United States
Military art and science - Automation Computer networks - United States Operational art (Military science) Information warfare - United States |
ISBN | 0-16-092035-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
""Book Title""; ""Contents""; ""Foreword""; ""Preface""; ""Acknowledgments""; ""Chapter One: From Firepower to Information Power to Brainpower""; ""Chapter Two: Cognitive Demands of Networked Warfare""; ""Chapter Three: Beyond the Networking Advantage""; ""Chapter Four: Defeating Networked Adversaries""; ""Chapter Five: Integrating Intuition and Reasoning in Action""; ""Chapter Six: From Networking Power to Cognitive Power""; ""Chapter Seven: An Excursion beyond the Military""; ""Chapter Eight: Creating a Battle-Wise Force""; ""Chapter Nine: Recommendations and Conclusions""; ""Afterword""
""Glossary of Key Concepts""""About the Authors"" |
Record Nr. | UNINA-9910661412403321 |
Gompert David C. | ||
Washington, District of Columbia : , : Published for the Center for Technology and National Security Policy by National Defense University Press, , 2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Brandishing cyberattack capabilities / / Martin C. Libicki |
Autore | Libicki Martin C |
Pubbl/distr/stampa | Santa Monica, CA : , : Rand National Defense Research Institute, , 2013 |
Descrizione fisica | 1 online resource (46 pages) |
Soggetto topico |
Information warfare - United States
Cyberterrorism - United States - Prevention Computer networks - Security measures - United States Cyberspace - Security measures - United States Computer networks - Security measures - Government policy - United States |
ISBN | 0-8330-8004-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910219973803321 |
Libicki Martin C | ||
Santa Monica, CA : , : Rand National Defense Research Institute, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Building castles on sand? : ignoring the riptide of information operations / / Carla D. Bass |
Autore | Bass Carla D |
Pubbl/distr/stampa | Maxwell Air Force Base, Ala. : , : Air War College, Air University, , [1998] |
Collana | Air War College, Maxwell Paper |
Soggetto topico |
Information technology - Military aspects - United States
Information warfare - United States |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Ignoring the riptide of information operations |
Record Nr. | UNINA-9910698242403321 |
Bass Carla D | ||
Maxwell Air Force Base, Ala. : , : Air War College, Air University, , [1998] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
China's cyber power and America's national security [[electronic resource] /] / by Jayson M. Spade ; edited by Jeffrey L. Caton |
Autore | Spade Jayson M |
Pubbl/distr/stampa | Carlisle Barracks, Penn. : , : U.S. Army War College, , [2012] |
Descrizione fisica | 1 online resource (viii unnumbered pages, 71 pages) |
Altri autori (Persone) | CatonJeffrey L |
Soggetto topico |
Information warfare - China
Information warfare - United States Cyberterrorism - China Computer networks - China Computer networks - Security measures - United States National security - United States |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Information as power |
Record Nr. | UNINA-9910702158803321 |
Spade Jayson M | ||
Carlisle Barracks, Penn. : , : U.S. Army War College, , [2012] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Crafting an information warfare and counter-propaganda strategy for the emerging security environment : hearing before the Subcommittee on Emerging Threats and Capabilities of the Committee on Armed Services, House of Representatives, One Hundred Fifteenth Congress, first session, hearing held March 15, 2017 |
Pubbl/distr/stampa | Washington : , : U.S. Government Publishing Office, , 2017 |
Descrizione fisica | 1 online resource (iii, 84 pages) |
Soggetto topico |
Cyberspace operations (Military science) - United States
Cyberspace - Security measures - United States Information warfare - United States Psychological warfare - United States Military planning - United States National security - United States |
Soggetto genere / forma | Legislative hearings. |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Crafting an information warfare and counter-propaganda strategy for the emerging security environment |
Record Nr. | UNINA-9910706178503321 |
Washington : , : U.S. Government Publishing Office, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Crisis and escalation in cyberspace / / Martin C. Libicki |
Autore | Libicki Martin C |
Pubbl/distr/stampa | Santa Monica, CA : , : RAND, Project Air Force, , 2012 |
Descrizione fisica | 1 online resource (279 p.) |
Disciplina | 358.4/141 |
Soggetto topico |
Information warfare - United States
Escalation (Military science) Cyberspace - Security measures Crisis management - Government policy - United States Cyberterrorism - Prevention Conflict management |
Soggetto genere / forma | Electronic books. |
ISBN |
0-8330-7679-5
0-8330-7680-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Avoiding crises by creating norms -- Narratives, dialogues, and signaling -- Escalation management -- Strategic stability -- Conclusions and recommendations for the Air Force -- Introduction -- Some hypothetical crises -- Mutual mistrust is likely to characterize a cyber crisis -- States may have room for maneuver in a cyber crisis -- A note on methodology -- Purpose and organization -- Avoiding crises by creating norms -- What kind of norms might be useful? -- Enforce laws against hacking -- Disassociate from freelance hackers -- Discourage commercial espionage -- Be careful about the obligation to suppress cyber traffic -- How do we enforce norms? -- Confidence-building measures -- Norms for victims of cyberattacks -- Norms for war? -- Deception -- Military necessity and collateral damage -- Proportionality -- Reversibility -- Conclusions -- Narratives, dialogue, and signals -- Narratives to promote control -- A narrative framework for cyberspace -- Victimization, attribution, retaliation, and aggression -- Victimization -- Attribution -- Retaliation -- Aggression -- Emollients: narratives to walk back a crisis -- We did nothing -- Well, at least not on our orders -- It was an accident -- This is nothing new -- At least it does not portend anything -- Broader considerations -- Signals -- Ambiguity in signaling -- Signaling resolve -- Signaling that cyber combat is not kinetic combat -- Conclusions -- Escalation management -- Motives for escalation -- Does escalation matter? -- Escalation risks -- Escalation risks in phase -- Escalation risks for contained local conflicts -- Escalation risks for uncontained conflicts -- Managing proxy cyberattacks -- What hidden combatants imply for horizontal escalation -- Managing overt proxy conflict -- The difficulties of tit-for-tat management -- The importance of pre-planning -- Disjunctions among effort, effect, and perception -- Inadvertent escalation -- Escalation into kinetic warfare -- Escalation into economic warfare -- Sub rosa escalation -- Managing the third-party problem -- The need for a clean shot -- Inference and narrative -- Command and control -- Commanders -- Those they command -- Conclusions -- Implications for strategic stability -- Translating sources of cold war instability to cyberspace -- What influence can cyberwar have if nuclear weapons exist? -- Can cyberwar disarm another state's nuclear capabilities? -- Can cyberwar disarm another states cyberwarriors? -- Does cyberwar lend itself to alert-reaction cycles? -- Are cyberdefenses inherently destabilizing? -- Would a cyberspace arms races be destabilizing? -- Misperception as a source of crisis -- Side takes great exception to cyberespionage -- Defenses are misinterpreted as preparations for war -- Too much confidence in attribution -- Too much confidence in or fear of pre-emption -- Supposedly risk-free cyberattacks -- Neutrality -- Conclusions -- Can cyber crises be managed? -- A. Distributed denial-of-service attacks -- B. Overt, obvious, and covert cyberattacks and responses -- Can good cyberdefenses discourage attacks? -- Bibliography -- Figures -- Figure 1: Alternative postures for a master cyber narrative -- Figure 2: Sources of imprecision in tit for tat -- Figure 3: An inadvertent path to mutual escalation -- Figure A-1: Configuring networks to limit the damage of DDoS attacks -- Table -- Overt, obvious, and covert cyberattacks and responses. |
Record Nr. | UNINA-9910219977703321 |
Libicki Martin C | ||
Santa Monica, CA : , : RAND, Project Air Force, , 2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Critical infrastructure protection [[electronic resource] ] : federal efforts require a more coordinated and comprehensive approach for protecting information systems |
Pubbl/distr/stampa | [Washington, D.C.] : , : U.S. General Accounting Office, , [2002] |
Soggetto topico |
Electronic data processing - Security measures - United States
Telecommunication - Defense measures - United States Computer networks - Security measures - United States Information warfare - United States |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Critical Infrastructure Protection |
Record Nr. | UNINA-9910693799303321 |
[Washington, D.C.] : , : U.S. General Accounting Office, , [2002] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber operations today : preparing for 21st century challenges in an information-enabled society : Committee on Armed Services, House of Representatives, One Hundred Fifteenth Congress, second session, hearing held April 11, 2018 |
Pubbl/distr/stampa | Washington : , : U.S. Government Publishing Office, , 2019 |
Descrizione fisica | 1 online resource (iii, 83 pages) |
Soggetto topico |
Cyberspace operations (Military science) - United States
Information warfare - United States Computer security - United States Cyberterrorism - United States - Prevention - Planning Computer security Cyberspace operations (Military science) Information warfare |
Soggetto genere / forma | Legislative hearings. |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Cyber operations today |
Record Nr. | UNINA-9910711952103321 |
Washington : , : U.S. Government Publishing Office, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber warfare : a documentary and reference guide / / Paul J. Springer |
Pubbl/distr/stampa | Santa Barbara, California : , : Greenwood, an imprint of ABC-CLIO, , [2020] |
Descrizione fisica | 1 online resource (xvii, 357 pages) |
Disciplina | 355.4 |
Collana | Documentary and reference guides |
Soggetto topico |
Cyberspace operations (Military science) - United States
Cyberspace - Government policy - United States Information warfare - United States |
ISBN |
979-84-00-63647-9
979-82-16-07053-5 1-4408-7279-1 |
Classificazione | 355.425 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. U.S. cyber strategy documents -- 2. U.S. assessments of cyber adversaries -- 3. U.S. policies, doctrine, and reports -- 4. Non-U.S. strategy and documents -- 5. Speeches, testimony, and transcripts. |
Record Nr. | UNINA-9910794058603321 |
Santa Barbara, California : , : Greenwood, an imprint of ABC-CLIO, , [2020] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|