top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Information warfare / Daniel Ventre
Information warfare / Daniel Ventre
Autore VENTRE, Daniel
Edizione [Revised and updated second ed.]
Descrizione fisica 330 p. ; 24 cm
Disciplina 355.343
Collana Information systems, web and pervasive computing series
Soggetto topico Cibernetica - Impiego bellico
ISBN 978-1-8482-660-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996480372303316
VENTRE, Daniel  
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information warfare / / Daniel Ventre
Information warfare / / Daniel Ventre
Autore Ventre Daniel
Edizione [Revised and updated second edition.]
Pubbl/distr/stampa London, England ; ; Hoboken, New Jersey : , : iSTE : , : Wiley, , 2016
Descrizione fisica 1 online resource (270 p.)
Disciplina 355.343
Collana Information systems, web and pervasive computing series
THEi Wiley ebooks
Soggetto topico Information warfare
Business intelligence
Trade secrets
Information technology - Security measures
Computer security - Management
Data protection
ISBN 1-119-27734-5
1-119-00472-1
1-119-27731-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Table of Contents; Title; Copyright; Introduction; 1 The United States; 1.1. Information warfare in the 1990s; 1.2. Information warfare in the 2000s; 1.3. Information warfare in the 2010s; 1.4. Important concepts and reflections; 2 China; 2.1. Significant publications; 2.2. Strategic and doctrinal thinking about information warfare. Genesis; 2.3. Recent policies and strategies on information and cyber security; 2.4. Reflections; 3 Russia; 3.1. Military doctrines and national security strategies; 3.2. Information warfare in practice; 3.3. Comments; 4 Concepts and Theories: Discussions
4.1. Doctrines4.2. Information warfare: definitions, models; 4.3. Information warfare or data warfare?; Conclusion; Index; End User License Agreement
Record Nr. UNINA-9910136251303321
Ventre Daniel  
London, England ; ; Hoboken, New Jersey : , : iSTE : , : Wiley, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information warfare / / Daniel Ventre
Information warfare / / Daniel Ventre
Autore Ventre Daniel
Edizione [Revised and updated second edition.]
Pubbl/distr/stampa London, England ; ; Hoboken, New Jersey : , : iSTE : , : Wiley, , 2016
Descrizione fisica 1 online resource (270 p.)
Disciplina 355.343
Collana Information systems, web and pervasive computing series
THEi Wiley ebooks
Soggetto topico Information warfare
Business intelligence
Trade secrets
Information technology - Security measures
Computer security - Management
Data protection
ISBN 1-119-27734-5
1-119-00472-1
1-119-27731-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Table of Contents; Title; Copyright; Introduction; 1 The United States; 1.1. Information warfare in the 1990s; 1.2. Information warfare in the 2000s; 1.3. Information warfare in the 2010s; 1.4. Important concepts and reflections; 2 China; 2.1. Significant publications; 2.2. Strategic and doctrinal thinking about information warfare. Genesis; 2.3. Recent policies and strategies on information and cyber security; 2.4. Reflections; 3 Russia; 3.1. Military doctrines and national security strategies; 3.2. Information warfare in practice; 3.3. Comments; 4 Concepts and Theories: Discussions
4.1. Doctrines4.2. Information warfare: definitions, models; 4.3. Information warfare or data warfare?; Conclusion; Index; End User License Agreement
Record Nr. UNINA-9910828680503321
Ventre Daniel  
London, England ; ; Hoboken, New Jersey : , : iSTE : , : Wiley, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Introduction to cyber-warfare : a multidisciplinary approach / Paulo Shakarian, Jana Shakarian, Andrew Ruef ; foreward by Sushil Jajodia
Introduction to cyber-warfare : a multidisciplinary approach / Paulo Shakarian, Jana Shakarian, Andrew Ruef ; foreward by Sushil Jajodia
Autore SHAKARIAN, Paulo
Pubbl/distr/stampa Amsterdam [etc.], : Syngress, 2013
Descrizione fisica XVII, 318 p. : ill. ; 24 cm
Disciplina 355.343
Altri autori (Persone) SHAKARIAN, Jana
RUEF, Andrew
Soggetto topico Guerra - Impiego [della] Cibernetica
ISBN 978-0-12-407814-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996407748803316
SHAKARIAN, Paulo  
Amsterdam [etc.], : Syngress, 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Journal of information warfare
Journal of information warfare
Pubbl/distr/stampa [Victoria, Australia] : , : [Teamlink Australia Pty Ltd.]
Disciplina 355.343
Soggetto topico Information warfare
Soggetto genere / forma Periodicals.
Soggetto non controllato Military Science - General
ISSN 1445-3347
Formato Materiale a stampa
Livello bibliografico Periodico
Lingua di pubblicazione eng
Record Nr. UNISA-996336732903316
[Victoria, Australia] : , : [Teamlink Australia Pty Ltd.]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
L'arte del servizio segreto / Allen Dulles
L'arte del servizio segreto / Allen Dulles
Autore Dulles, Allen Welsh <1893-1969>
Pubbl/distr/stampa Milano : Garzanti, 1963
Descrizione fisica 325 p. ; 22 cm
Disciplina 355.343
Soggetto non controllato Spionaggio e controspionaggio
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione ita
Record Nr. UNINA-990006739100403321
Dulles, Allen Welsh <1893-1969>  
Milano : Garzanti, 1963
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
La Campagna d'Italia e i servizi segreti : la storia dell'ORI (1943-1945) / Raimondo Craveri
La Campagna d'Italia e i servizi segreti : la storia dell'ORI (1943-1945) / Raimondo Craveri
Autore Craveri, Raimondo
Pubbl/distr/stampa Milano : La Pietra, 1980
Descrizione fisica 336 p. ; 21 cm
Disciplina 355.343
Collana Protagonisti
Soggetto non controllato Spionaggio e controspionaggio - Guerra mondiale 1939-1945
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione ita
Record Nr. UNINA-990004032020403321
Craveri, Raimondo  
Milano : La Pietra, 1980
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
National security drivers of Ukraine : information technology, strategic communication, and legitimacy / / Oleksandr Radchenko [et al.], editors
National security drivers of Ukraine : information technology, strategic communication, and legitimacy / / Oleksandr Radchenko [et al.], editors
Edizione [First edition.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer Nature Switzerland AG, , [2023]
Descrizione fisica 1 online resource (xiii, 316 pages) : illustrations (some color)
Disciplina 355.343
Collana Contributions to Political Science
Soggetto topico Information warfare
International relations
National security - Ukraine
Security, International
ISBN 3-031-33724-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part 1. National Security: Theoretical and Methodological Approaches -- Chapter 1. Review of the Ukrainian Discourse Field of National Security Issues of the Modern State -- Chapter 2. Societal Content and Main Determinants of “National Security” Phenomenon in the Information and Communication Context -- Chapter 3. Systematization of Main Threats to the National Security of the State in Modern Conditions -- Part 2. Informational Security Phenomenon -- Chapter 4. Post Industrial Society and Global Informational Space as Infrastructure Medium and Factor for Actualization of the State Informational Security -- Chapter 5. Substantive Essence and Components of the Societal Phenomenon “Information Security” in the Age of Information Society -- Chapter 6. Formation of Information Security Systems of the State: Current Status, Trends and Problems -- Part 3. Strategic Communications -- Chapter 7. Theoretical Models of Information and Communication Interaction of State and Society in the Context of National Security -- Chapter 8. Place and Role of Strategic Communications in Public Management System -- Chapter 9. Structure and Function of Strategic Communications in the System of National and Informational State Security -- Chapter 10. Current State of Strategic Communications in Ukraine and Their Functional Influence on Efficiency of State Management System -- Part 4. Legitimacy and Legitimation -- Chapter 11. Essence and Content of State-Administrative Duality “Legitimacy” – “Legitimation” and its Place in the Information Security System of the Modern State -- Chapter 12. Comparative Analysis of Conceptual Models of Power Legitimation in Authoritarian, Democratic and Transitional Societies -- Chapter 13. Project Approach in the Executive Bodies Activity of United Territorial Communities as a Modern Mechanism of Local Public Authorities’ Legitimation in Ukraine -- Chapter 14. “Legitimacy Crisis” and its Impact on the Stability and Security of the System of Public Authorities of the State During the Formation of the Global Information Space -- Part 5. Informational Wars -- Chapter 15. Information Wars: Historical and Comparative Analysis, Specifics and Factors of Actualization in the Modern World -- Chapter 16. Information Weapons: Forms and Technologies of Modern Information Wars -- Chapter 17. Tools for Counteracting Information Aggression Use of Elements of Information War in Ukraine -- Chapter 18. Mental and Value Features of Ukrainian Society in the Context of “Civilizations Clash” as the Main Object of Information War in Ukraine.
Record Nr. UNINA-9910746096903321
Cham, Switzerland : , : Springer Nature Switzerland AG, , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
North Korea's cyber operations : strategy and responses / / Jenny Jun, Scott LaFoy, Ethan Sohn ; project director
North Korea's cyber operations : strategy and responses / / Jenny Jun, Scott LaFoy, Ethan Sohn ; project director
Autore Jun Jenny
Pubbl/distr/stampa Lanham, Maryland : , : Rowman & Littlefield, , 2015
Descrizione fisica 1 online resource (106 p.)
Disciplina 355.343
Collana CSIS Reports
Soggetto topico Cyberspace operations (Military science) - Korea (North)
Cyberterrorism - Prevention
Computer networks - Security measures
ISBN 1-4422-5903-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto North Korea's Cyber Operations ; Contents ; Preface ; Acknowledgments ; Abbreviations ; Introduction ; Purpose, Scope, and Methods ; A Note on Open-Source Reporting on DPRK ; Executive Summary ; 1. Strategic Context ; DPRK Military and Political Strategy ; Strategic Use of Cyberspace ; DPRK Cyber Strategy ; 2. Organization ; Reconnaissance General Bureau ; General Staff Department of the Korean People's Army ; Technology and Industrial Base ; 3. Future Trends and Policy Recommendations ; Future Trends ; Policy Objectives ; Recommendations for the United States
Recommendations for the U.S.-ROK Alliance Appendix. Disruptive Cyber Operations Commonly Associated with North Korea ; Bibliography ; About the Project Directors and Authors
Record Nr. UNINA-9910797949303321
Jun Jenny  
Lanham, Maryland : , : Rowman & Littlefield, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
North Korea's cyber operations : strategy and responses / / Jenny Jun, Scott LaFoy, Ethan Sohn ; project director
North Korea's cyber operations : strategy and responses / / Jenny Jun, Scott LaFoy, Ethan Sohn ; project director
Autore Jun Jenny
Pubbl/distr/stampa Lanham, Maryland : , : Rowman & Littlefield, , 2015
Descrizione fisica 1 online resource (106 p.)
Disciplina 355.343
Collana CSIS Reports
Soggetto topico Cyberspace operations (Military science) - Korea (North)
Cyberterrorism - Prevention
Computer networks - Security measures
ISBN 1-4422-5903-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto North Korea's Cyber Operations ; Contents ; Preface ; Acknowledgments ; Abbreviations ; Introduction ; Purpose, Scope, and Methods ; A Note on Open-Source Reporting on DPRK ; Executive Summary ; 1. Strategic Context ; DPRK Military and Political Strategy ; Strategic Use of Cyberspace ; DPRK Cyber Strategy ; 2. Organization ; Reconnaissance General Bureau ; General Staff Department of the Korean People's Army ; Technology and Industrial Base ; 3. Future Trends and Policy Recommendations ; Future Trends ; Policy Objectives ; Recommendations for the United States
Recommendations for the U.S.-ROK Alliance Appendix. Disruptive Cyber Operations Commonly Associated with North Korea ; Bibliography ; About the Project Directors and Authors
Record Nr. UNINA-9910814330203321
Jun Jenny  
Lanham, Maryland : , : Rowman & Littlefield, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui