top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Artificial intelligence, cybersecurity and cyber defense / / Daniel Ventre
Artificial intelligence, cybersecurity and cyber defense / / Daniel Ventre
Autore Ventre Daniel
Edizione [1st edition.]
Pubbl/distr/stampa Hoboken, New Jersey : , : ISTE Ltd / John Wiley and Sons Inc, , [2020]
Descrizione fisica 1 online resource (267 pages) : illustrations
Disciplina 006.3
Soggetto topico Artificial intelligence
Computer security
Computer networks - Security measures
ISBN 1-5231-3680-4
1-119-78819-6
1-119-78817-X
1-119-78818-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910555079403321
Ventre Daniel  
Hoboken, New Jersey : , : ISTE Ltd / John Wiley and Sons Inc, , [2020]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Artificial intelligence, cybersecurity and cyber defense / / Daniel Ventre
Artificial intelligence, cybersecurity and cyber defense / / Daniel Ventre
Autore Ventre Daniel
Edizione [1st edition.]
Pubbl/distr/stampa Hoboken, New Jersey : , : ISTE Ltd / John Wiley and Sons Inc, , [2020]
Descrizione fisica 1 online resource (267 pages) : illustrations
Disciplina 006.3
Soggetto topico Artificial intelligence
Computer security
Computer networks - Security measures
ISBN 1-5231-3680-4
1-119-78819-6
1-119-78817-X
1-119-78818-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910811705403321
Ventre Daniel  
Hoboken, New Jersey : , : ISTE Ltd / John Wiley and Sons Inc, , [2020]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber conflict [[electronic resource] ] : competing national perspectives / / edited by Daniel Ventre
Cyber conflict [[electronic resource] ] : competing national perspectives / / edited by Daniel Ventre
Autore Ventre Daniel
Edizione [1st edition]
Pubbl/distr/stampa London, : Iste
Descrizione fisica 1 online resource (345 p.)
Disciplina 363.325/6004678
Altri autori (Persone) VentreDaniel
Collana ISTE
Soggetto topico Internet - Security measures
Cyberspace - Security measures
Computer networks - Security measures
ISBN 1-118-56266-6
1-118-56274-7
1-118-56296-8
1-299-18890-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright Page; Table of Contents; Introduction; Chapter 1. Canada's Cyber Security Policy: a Tortuous Path Toward a Cyber Security Strategy; 1.1. Introduction; 1.2. Canada in North America: sovereign but subordinate?; 1.3. Counter-terrorism for the improvement of national security; 1.4. The long path to a national CI protection strategy and nationalcyber security strategy; 1.5. The adoption of the current strategies for CI protection and cyber security; 1.6. Conclusion; 1.7. Bibliography; 1.7.1. Scientific and media articles; 1.7.2. Primary Data; 1.7.3. Websites
Chapter 2. Cuba: Towards an Active Cyber-defense2.1. Cyberspace: statistics and history; 2.1.1. The marginalization of Cuba; 2.1.2. Cuban cyberspace as the target of attacks; 2.2. Theoretical and practical considerations on information warfareand cyber-warfare; 2.2.1. Development of capabilities; 2.3. Cyber-warfare theories and practices; 2.3.1. Fidel Castro's discourse; 2.3.2. The concept of active cyber-defense; 2.4. Regulations and ways around them; 2.4.1. The State's influence over cyberspace; 2.4.2. Getting around the restrictions
2.5. Capabilities of control, surveillance and interception2.6. Enemies; 2.7. Conclusion; 2.8. Bibliography; Chapter 3. French Perspectives on Cyber-conflict; 3.1. Cyberspace; 3.2. Assessments, view on the world and awakening; 3.2.1. Attacks; 3.2.2. The feeling of insecurity, the threat; 3.2.3. Potential vulnerabilities of States; 3.2.4. Evolution of the international environment; 3.3. Reaction, position of France and choice: theories, political strategies and military doctrines; 3.3.1. Information: a powerful weapon for those controlling it; 3.3.2. Media information: beneficial if controlled
3.3.3. Economic information as power, if controlled3.3.4. Information warfare; 3.3.5. Information warfare or information control; 3.3.6. The ANSSI; 3.3.7. Cyber-security and cyber-defense; 3.3.8. Army: Information operations, NEB (numérisation de l'espace de bataille/digitization of battlespace), info-development; 3.3.9. Cyber-war and other modalities of the cyber-conflict; 3.4. Conclusion; 3.5. Bibliography; Chapter 4. Digital Sparta: Information Operationsand Cyber-warfare in Greece; 4.1. Geopolitical significance; 4.2. Strategic concerns and internal balancing
4.3. Formative experiences in information operations: the Ergenekon conspiracy4.4. Formative experiences in information operations:intensifying cyber-attacks; 4.5. Formative experiences in information operations: the Öcalan affair; 4.6. Formative experiences in information operations: the Greek wiretapping case of 2004-2005; 4.7. Emerging civilian information operations strategies; 4.8. Emerging military information operations strategies; 4.9. The European Union dimension in Greek information operations; 4.10. Conclusion; 4.11. Bibliography
Chapter 5. Moving Toward an Italian Cyber Defenseand Security Strategy
Record Nr. UNINA-9910138856703321
Ventre Daniel  
London, : Iste
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber conflict [[electronic resource] ] : competing national perspectives / / edited by Daniel Ventre
Cyber conflict [[electronic resource] ] : competing national perspectives / / edited by Daniel Ventre
Autore Ventre Daniel
Edizione [1st edition]
Pubbl/distr/stampa London, : Iste
Descrizione fisica 1 online resource (345 p.)
Disciplina 363.325/6004678
Altri autori (Persone) VentreDaniel
Collana ISTE
Soggetto topico Internet - Security measures
Cyberspace - Security measures
Computer networks - Security measures
ISBN 1-118-56266-6
1-118-56274-7
1-118-56296-8
1-299-18890-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright Page; Table of Contents; Introduction; Chapter 1. Canada's Cyber Security Policy: a Tortuous Path Toward a Cyber Security Strategy; 1.1. Introduction; 1.2. Canada in North America: sovereign but subordinate?; 1.3. Counter-terrorism for the improvement of national security; 1.4. The long path to a national CI protection strategy and nationalcyber security strategy; 1.5. The adoption of the current strategies for CI protection and cyber security; 1.6. Conclusion; 1.7. Bibliography; 1.7.1. Scientific and media articles; 1.7.2. Primary Data; 1.7.3. Websites
Chapter 2. Cuba: Towards an Active Cyber-defense2.1. Cyberspace: statistics and history; 2.1.1. The marginalization of Cuba; 2.1.2. Cuban cyberspace as the target of attacks; 2.2. Theoretical and practical considerations on information warfareand cyber-warfare; 2.2.1. Development of capabilities; 2.3. Cyber-warfare theories and practices; 2.3.1. Fidel Castro's discourse; 2.3.2. The concept of active cyber-defense; 2.4. Regulations and ways around them; 2.4.1. The State's influence over cyberspace; 2.4.2. Getting around the restrictions
2.5. Capabilities of control, surveillance and interception2.6. Enemies; 2.7. Conclusion; 2.8. Bibliography; Chapter 3. French Perspectives on Cyber-conflict; 3.1. Cyberspace; 3.2. Assessments, view on the world and awakening; 3.2.1. Attacks; 3.2.2. The feeling of insecurity, the threat; 3.2.3. Potential vulnerabilities of States; 3.2.4. Evolution of the international environment; 3.3. Reaction, position of France and choice: theories, political strategies and military doctrines; 3.3.1. Information: a powerful weapon for those controlling it; 3.3.2. Media information: beneficial if controlled
3.3.3. Economic information as power, if controlled3.3.4. Information warfare; 3.3.5. Information warfare or information control; 3.3.6. The ANSSI; 3.3.7. Cyber-security and cyber-defense; 3.3.8. Army: Information operations, NEB (numérisation de l'espace de bataille/digitization of battlespace), info-development; 3.3.9. Cyber-war and other modalities of the cyber-conflict; 3.4. Conclusion; 3.5. Bibliography; Chapter 4. Digital Sparta: Information Operationsand Cyber-warfare in Greece; 4.1. Geopolitical significance; 4.2. Strategic concerns and internal balancing
4.3. Formative experiences in information operations: the Ergenekon conspiracy4.4. Formative experiences in information operations:intensifying cyber-attacks; 4.5. Formative experiences in information operations: the Öcalan affair; 4.6. Formative experiences in information operations: the Greek wiretapping case of 2004-2005; 4.7. Emerging civilian information operations strategies; 4.8. Emerging military information operations strategies; 4.9. The European Union dimension in Greek information operations; 4.10. Conclusion; 4.11. Bibliography
Chapter 5. Moving Toward an Italian Cyber Defenseand Security Strategy
Record Nr. UNINA-9910820094103321
Ventre Daniel  
London, : Iste
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyberwar and information warfare [[electronic resource] /] / edited by Daniel Ventre
Cyberwar and information warfare [[electronic resource] /] / edited by Daniel Ventre
Autore Ventre Daniel
Edizione [1st edition]
Pubbl/distr/stampa London, : ISTE
Descrizione fisica 1 online resource (434 p.)
Disciplina 355.3/43
355.343
Altri autori (Persone) VentreDaniel
Collana ISTE
Soggetto topico Information warfare
Psychological warfare
Computer crimes
Soggetto genere / forma Electronic books.
ISBN 1-118-60348-6
1-299-18789-7
1-118-60339-7
1-118-60351-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Cyberwar and Information Warfare; Title Page; Copyright Page; Table of Contents; Introduction; List of Acronyms; Chapter 1. Cyberwar and its Borders; 1.1. The seduction of cyberwar; 1.2. Desirable, vulnerable and frightening information; 1.3. Conflict and its dimensions; 1.4. The Helm and space; 1.5. Between knowledge and violence; 1.6. Space, distance and paths; 1.7. The permanency of war; 1.8. No war without borders; 1.9. The enemy and the sovereign; 1.10. Strengths and weaknesses; 1.11. Bibliography; Chapter 2. War of Meaning, Cyberwar and Democracies; 2.1. Introduction
2.2. Informational environment, a new operating space for strategy2.2.1. War and information: stakes for the West; 2.2.2. Strategy in the information environment; 2.2.3. Winning the battle of legitimacies; 2.3. Influence strategy: defeating and limiting armed force physical involvement; 2.3.1. Describing the aggressor; 2.3.2. Armed forces and the information environment; 2.3.3. The need for moral force; 2.4. Conclusion; 2.5. Bibliography; Chapter 3. Intelligence, the First Defense? Information Warfare and Strategic Surprise; 3.1. Information warfare, information and war
3.2. Intelligence and strategic surprise3.2.1. Strategic surprise; 3.2.2. Perception of surprise; 3.2.3. Perception of the possibility of surprise; 3.3. Strategic surprise and information warfare; 3.4. Concluding remarks: surprise in strategic studies; 3.5. Bibliography; Chapter 4. Cyberconflict: Stakes of Power; 4.1. Stakes of power; 4.1.1. Power relations; 4.1.2. Expression of sovereignty; 4.1.3. Cyberpower; 4.1.4. Measuring and locating power; 4.1.5. Limits of exercising power; 4.1.6. The Monroe doctrine; 4.1.7. Globalization; 4.1.8. Shock theories; 4.1.9. Naval and maritime power strategy
4.1.10. Air/space and cybernetic power: analogies4.1.11. Cyberconflict/cyber weapons, chemical/biological weapons: comparisons; 4.1.12. Cyberconflict/cyber weapons, Cold War, nuclear weapons: comparisons; 4.1.13. Cyberconflict and new wars; 4.2. The Stuxnet affair; 4.3. Bibliography; Chapter 5. Operational Aspects of a Cyberattack: Intelligence, Planning and Conduct; 5.1. Introduction; 5.2. Towards a broader concept of cyberwar; 5.2.1. War and cyberwar: common ground; 5.2.2. New orders in cyberwar; 5.2.3. Who are cyberwarriors?; 5.2.4. Is formalization possible?
5.3. Concept of critical infrastructure5.3.1. Generalized definition of the notion of critical infrastructure; 5.3.2. System interdependence; 5.4. Different phases of a cyberattack; 5.4.1. Intelligence phase; 5.4.2. Planning phase; 5.4.3. Conduct phase; 5.5. A few "elementary building blocks"; 5.5.1. General tactical framework; 5.5.2. Attacks on people; 5.5.3. Opinion manipulation and area control; 5.5.4. Military computer attack in a conventional operation; 5.6. Example scenario; 5.6.1. Tactical scenario; 5.6.2. The order of events; 5.6.3. Analysis; 5.7. Conclusion; 5.8. Bibliography
Chapter 6. Riots in Xinjiang and Chinese Information Warfare
Record Nr. UNINA-9910141487803321
Ventre Daniel  
London, : ISTE
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyberwar and information warfare [[electronic resource] /] / edited by Daniel Ventre
Cyberwar and information warfare [[electronic resource] /] / edited by Daniel Ventre
Autore Ventre Daniel
Edizione [1st edition]
Pubbl/distr/stampa London, : ISTE
Descrizione fisica 1 online resource (434 p.)
Disciplina 355.3/43
355.343
Altri autori (Persone) VentreDaniel
Collana ISTE
Soggetto topico Information warfare
Psychological warfare
Computer crimes
ISBN 1-118-60348-6
1-299-18789-7
1-118-60339-7
1-118-60351-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Cyberwar and Information Warfare; Title Page; Copyright Page; Table of Contents; Introduction; List of Acronyms; Chapter 1. Cyberwar and its Borders; 1.1. The seduction of cyberwar; 1.2. Desirable, vulnerable and frightening information; 1.3. Conflict and its dimensions; 1.4. The Helm and space; 1.5. Between knowledge and violence; 1.6. Space, distance and paths; 1.7. The permanency of war; 1.8. No war without borders; 1.9. The enemy and the sovereign; 1.10. Strengths and weaknesses; 1.11. Bibliography; Chapter 2. War of Meaning, Cyberwar and Democracies; 2.1. Introduction
2.2. Informational environment, a new operating space for strategy2.2.1. War and information: stakes for the West; 2.2.2. Strategy in the information environment; 2.2.3. Winning the battle of legitimacies; 2.3. Influence strategy: defeating and limiting armed force physical involvement; 2.3.1. Describing the aggressor; 2.3.2. Armed forces and the information environment; 2.3.3. The need for moral force; 2.4. Conclusion; 2.5. Bibliography; Chapter 3. Intelligence, the First Defense? Information Warfare and Strategic Surprise; 3.1. Information warfare, information and war
3.2. Intelligence and strategic surprise3.2.1. Strategic surprise; 3.2.2. Perception of surprise; 3.2.3. Perception of the possibility of surprise; 3.3. Strategic surprise and information warfare; 3.4. Concluding remarks: surprise in strategic studies; 3.5. Bibliography; Chapter 4. Cyberconflict: Stakes of Power; 4.1. Stakes of power; 4.1.1. Power relations; 4.1.2. Expression of sovereignty; 4.1.3. Cyberpower; 4.1.4. Measuring and locating power; 4.1.5. Limits of exercising power; 4.1.6. The Monroe doctrine; 4.1.7. Globalization; 4.1.8. Shock theories; 4.1.9. Naval and maritime power strategy
4.1.10. Air/space and cybernetic power: analogies4.1.11. Cyberconflict/cyber weapons, chemical/biological weapons: comparisons; 4.1.12. Cyberconflict/cyber weapons, Cold War, nuclear weapons: comparisons; 4.1.13. Cyberconflict and new wars; 4.2. The Stuxnet affair; 4.3. Bibliography; Chapter 5. Operational Aspects of a Cyberattack: Intelligence, Planning and Conduct; 5.1. Introduction; 5.2. Towards a broader concept of cyberwar; 5.2.1. War and cyberwar: common ground; 5.2.2. New orders in cyberwar; 5.2.3. Who are cyberwarriors?; 5.2.4. Is formalization possible?
5.3. Concept of critical infrastructure5.3.1. Generalized definition of the notion of critical infrastructure; 5.3.2. System interdependence; 5.4. Different phases of a cyberattack; 5.4.1. Intelligence phase; 5.4.2. Planning phase; 5.4.3. Conduct phase; 5.5. A few "elementary building blocks"; 5.5.1. General tactical framework; 5.5.2. Attacks on people; 5.5.3. Opinion manipulation and area control; 5.5.4. Military computer attack in a conventional operation; 5.6. Example scenario; 5.6.1. Tactical scenario; 5.6.2. The order of events; 5.6.3. Analysis; 5.7. Conclusion; 5.8. Bibliography
Chapter 6. Riots in Xinjiang and Chinese Information Warfare
Record Nr. UNINA-9910830507403321
Ventre Daniel  
London, : ISTE
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyberwar and information warfare [[electronic resource] /] / edited by Daniel Ventre
Cyberwar and information warfare [[electronic resource] /] / edited by Daniel Ventre
Autore Ventre Daniel
Edizione [1st edition]
Pubbl/distr/stampa London, : ISTE
Descrizione fisica 1 online resource (434 p.)
Disciplina 355.3/43
355.343
Altri autori (Persone) VentreDaniel
Collana ISTE
Soggetto topico Information warfare
Psychological warfare
Computer crimes
ISBN 1-118-60348-6
1-299-18789-7
1-118-60339-7
1-118-60351-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Cyberwar and Information Warfare; Title Page; Copyright Page; Table of Contents; Introduction; List of Acronyms; Chapter 1. Cyberwar and its Borders; 1.1. The seduction of cyberwar; 1.2. Desirable, vulnerable and frightening information; 1.3. Conflict and its dimensions; 1.4. The Helm and space; 1.5. Between knowledge and violence; 1.6. Space, distance and paths; 1.7. The permanency of war; 1.8. No war without borders; 1.9. The enemy and the sovereign; 1.10. Strengths and weaknesses; 1.11. Bibliography; Chapter 2. War of Meaning, Cyberwar and Democracies; 2.1. Introduction
2.2. Informational environment, a new operating space for strategy2.2.1. War and information: stakes for the West; 2.2.2. Strategy in the information environment; 2.2.3. Winning the battle of legitimacies; 2.3. Influence strategy: defeating and limiting armed force physical involvement; 2.3.1. Describing the aggressor; 2.3.2. Armed forces and the information environment; 2.3.3. The need for moral force; 2.4. Conclusion; 2.5. Bibliography; Chapter 3. Intelligence, the First Defense? Information Warfare and Strategic Surprise; 3.1. Information warfare, information and war
3.2. Intelligence and strategic surprise3.2.1. Strategic surprise; 3.2.2. Perception of surprise; 3.2.3. Perception of the possibility of surprise; 3.3. Strategic surprise and information warfare; 3.4. Concluding remarks: surprise in strategic studies; 3.5. Bibliography; Chapter 4. Cyberconflict: Stakes of Power; 4.1. Stakes of power; 4.1.1. Power relations; 4.1.2. Expression of sovereignty; 4.1.3. Cyberpower; 4.1.4. Measuring and locating power; 4.1.5. Limits of exercising power; 4.1.6. The Monroe doctrine; 4.1.7. Globalization; 4.1.8. Shock theories; 4.1.9. Naval and maritime power strategy
4.1.10. Air/space and cybernetic power: analogies4.1.11. Cyberconflict/cyber weapons, chemical/biological weapons: comparisons; 4.1.12. Cyberconflict/cyber weapons, Cold War, nuclear weapons: comparisons; 4.1.13. Cyberconflict and new wars; 4.2. The Stuxnet affair; 4.3. Bibliography; Chapter 5. Operational Aspects of a Cyberattack: Intelligence, Planning and Conduct; 5.1. Introduction; 5.2. Towards a broader concept of cyberwar; 5.2.1. War and cyberwar: common ground; 5.2.2. New orders in cyberwar; 5.2.3. Who are cyberwarriors?; 5.2.4. Is formalization possible?
5.3. Concept of critical infrastructure5.3.1. Generalized definition of the notion of critical infrastructure; 5.3.2. System interdependence; 5.4. Different phases of a cyberattack; 5.4.1. Intelligence phase; 5.4.2. Planning phase; 5.4.3. Conduct phase; 5.5. A few "elementary building blocks"; 5.5.1. General tactical framework; 5.5.2. Attacks on people; 5.5.3. Opinion manipulation and area control; 5.5.4. Military computer attack in a conventional operation; 5.6. Example scenario; 5.6.1. Tactical scenario; 5.6.2. The order of events; 5.6.3. Analysis; 5.7. Conclusion; 5.8. Bibliography
Chapter 6. Riots in Xinjiang and Chinese Information Warfare
Record Nr. UNINA-9910841006703321
Ventre Daniel  
London, : ISTE
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Electronic communication interception technologies and issues of power / / Daniel Ventre and Philippe Guillot
Electronic communication interception technologies and issues of power / / Daniel Ventre and Philippe Guillot
Autore Ventre Daniel
Edizione [1st ed.]
Pubbl/distr/stampa London, England ; Hoboken, NJ : , : ISTE Ltd : , : John Wiley & Sons, Inc., , [2023]
Descrizione fisica 1 online resource (259 pages)
Disciplina 929.605
Soggetto topico Computers
ISBN 1-394-23672-7
1-394-23670-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover -- Title Page -- Copyright Page -- Contents -- Introduction -- Chapter 1. History and Repertoire of Communication Interception Practices -- 1.1. Military interceptions during the war -- 1.1.1. The interception of telegraphic communications -- 1.1.2. The interception of radio communications -- 1.1.3. Telephone interception -- 1.1.4. The use of SIGINT capabilities -- 1.1.5. Wartime interceptions in cyberspace -- 1.1.6. Drones and interceptions -- 1.2. The interception of international communications: espionage, surveillance, war -- 1.2.1. The interception of telegrams -- 1.2.2. Espionage during the Cold War: satellite, radio, telephone interceptions -- 1.2.3. The interception of international communications: the Echelon program -- 1.2.4. Bulk cyber surveillance -- 1.2.5. Foreign companies in national telecommunication infrastructures -- 1.2.6. Actions over undersea Internet cables -- 1.2.7. Interceptions in planes and airports -- 1.2.8. International interceptions as a product of secret alliances -- 1.3. Interception of diplomatic correspondence -- 1.4. Political surveillance: targeted and bulk interceptions -- 1.4.1. Interception of correspondence -- 1.4.2. Bulk domestic surveillance in East Germany -- 1.4.3. Cyber surveillance in Russia: the SORM system -- 1.4.4. Fixed and mobile telephone tapping -- 1.4.5. The interception of electronic communications in the political sphere -- 1.5. Criminal interceptions -- 1.6. Police, justice: the fight against crime, lawful interceptions -- 1.7. On the usefulness and effectiveness of interceptions -- Chapter 2. The Central Issue of Encryption -- 2.1. The capabilities required for interceptions -- 2.1.1. Material, technological capabilities -- 2.1.2. Human resources -- 2.2. Protecting yourself against the threat of interceptions: encryption -- 2.2.1. The public key revolution.
2.2.2. Advances in factorization -- 2.2.3. Shor's quantum algorithm -- 2.2.4. The evolution of computing capabilities -- 2.2.5. The evolution of etching precision -- 2.3. Attacking encrypted communications, circumventing the hurdle of encryption -- 2.3.1. Interceptions on encrypted messaging -- 2.3.2. The attacks against keys and PKIs -- 2.3.3. The use of backdoors -- Chapter 3. Power Struggles -- 3.1. State pressure on the industry: cooperation or coercion logics? -- 3.2. The accounts of whistleblowers and their analyses of the balance of power between the state, the citizen and companies -- 3.2.1. The account of Herbert O. Yardley -- 3.2.2. The account of Perry Fellwock (also known as Winslow Peck) -- 3.2.3. The account of Mark Klein -- 3.2.4. The account of James Bamford -- 3.2.5. The account of Babak Pasdar -- 3.2.6. The account of Joseph Nacchio -- 3.2.7. The account of Edward Snowden -- 3.2.8. The account of Julian Assange -- 3.3. Limits imposed on the state's power to control technology -- 3.3.1. The difficult and fragile international regulation of technologies -- 3.3.2. Illicit markets and the circumvention of laws -- 3.4. Trust -- 3.4.1. How much confidence in encryption? -- 3.4.2. The acceleration of calculations as a factor of confidence -- 3.4.3. Abandoning secret methods -- 3.4.4. Provable security -- 3.4.5. The worlds of Impagliazzo -- 3.4.6. The contribution of quantum computing -- 3.5. Conclusion -- 3.5.1. Technologies -- 3.5.2. Actors -- 3.5.3. Interactions or relationships -- Appendices -- References -- Index -- EULA.
Record Nr. UNINA-9910830906003321
Ventre Daniel  
London, England ; Hoboken, NJ : , : ISTE Ltd : , : John Wiley & Sons, Inc., , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information warfare / / Daniel Ventre
Information warfare / / Daniel Ventre
Autore Ventre Daniel
Edizione [Revised and updated second edition.]
Pubbl/distr/stampa London, England ; ; Hoboken, New Jersey : , : iSTE : , : Wiley, , 2016
Descrizione fisica 1 online resource (270 p.)
Disciplina 355.343
Collana Information systems, web and pervasive computing series
THEi Wiley ebooks
Soggetto topico Information warfare
Business intelligence
Trade secrets
Information technology - Security measures
Computer security - Management
Data protection
ISBN 1-119-27734-5
1-119-00472-1
1-119-27731-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Table of Contents; Title; Copyright; Introduction; 1 The United States; 1.1. Information warfare in the 1990s; 1.2. Information warfare in the 2000s; 1.3. Information warfare in the 2010s; 1.4. Important concepts and reflections; 2 China; 2.1. Significant publications; 2.2. Strategic and doctrinal thinking about information warfare. Genesis; 2.3. Recent policies and strategies on information and cyber security; 2.4. Reflections; 3 Russia; 3.1. Military doctrines and national security strategies; 3.2. Information warfare in practice; 3.3. Comments; 4 Concepts and Theories: Discussions
4.1. Doctrines4.2. Information warfare: definitions, models; 4.3. Information warfare or data warfare?; Conclusion; Index; End User License Agreement
Record Nr. UNINA-9910136251303321
Ventre Daniel  
London, England ; ; Hoboken, New Jersey : , : iSTE : , : Wiley, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information warfare / / Daniel Ventre
Information warfare / / Daniel Ventre
Autore Ventre Daniel
Edizione [Revised and updated second edition.]
Pubbl/distr/stampa London, England ; ; Hoboken, New Jersey : , : iSTE : , : Wiley, , 2016
Descrizione fisica 1 online resource (270 p.)
Disciplina 355.343
Collana Information systems, web and pervasive computing series
THEi Wiley ebooks
Soggetto topico Information warfare
Business intelligence
Trade secrets
Information technology - Security measures
Computer security - Management
Data protection
ISBN 1-119-27734-5
1-119-00472-1
1-119-27731-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Table of Contents; Title; Copyright; Introduction; 1 The United States; 1.1. Information warfare in the 1990s; 1.2. Information warfare in the 2000s; 1.3. Information warfare in the 2010s; 1.4. Important concepts and reflections; 2 China; 2.1. Significant publications; 2.2. Strategic and doctrinal thinking about information warfare. Genesis; 2.3. Recent policies and strategies on information and cyber security; 2.4. Reflections; 3 Russia; 3.1. Military doctrines and national security strategies; 3.2. Information warfare in practice; 3.3. Comments; 4 Concepts and Theories: Discussions
4.1. Doctrines4.2. Information warfare: definitions, models; 4.3. Information warfare or data warfare?; Conclusion; Index; End User License Agreement
Record Nr. UNINA-9910828680503321
Ventre Daniel  
London, England ; ; Hoboken, New Jersey : , : iSTE : , : Wiley, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui