Information warfare / Daniel Ventre |
Autore | VENTRE, Daniel |
Edizione | [Revised and updated second ed.] |
Descrizione fisica | 330 p. ; 24 cm |
Disciplina | 355.343 |
Collana | Information systems, web and pervasive computing series |
Soggetto topico | Cibernetica - Impiego bellico |
ISBN | 978-1-8482-660-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996480372303316 |
VENTRE, Daniel | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information warfare / / Daniel Ventre |
Autore | Ventre Daniel |
Edizione | [Revised and updated second edition.] |
Pubbl/distr/stampa | London, England ; ; Hoboken, New Jersey : , : iSTE : , : Wiley, , 2016 |
Descrizione fisica | 1 online resource (270 p.) |
Disciplina | 355.343 |
Collana |
Information systems, web and pervasive computing series
THEi Wiley ebooks |
Soggetto topico |
Information warfare
Business intelligence Trade secrets Information technology - Security measures Computer security - Management Data protection |
ISBN |
1-119-27734-5
1-119-00472-1 1-119-27731-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Table of Contents; Title; Copyright; Introduction; 1 The United States; 1.1. Information warfare in the 1990s; 1.2. Information warfare in the 2000s; 1.3. Information warfare in the 2010s; 1.4. Important concepts and reflections; 2 China; 2.1. Significant publications; 2.2. Strategic and doctrinal thinking about information warfare. Genesis; 2.3. Recent policies and strategies on information and cyber security; 2.4. Reflections; 3 Russia; 3.1. Military doctrines and national security strategies; 3.2. Information warfare in practice; 3.3. Comments; 4 Concepts and Theories: Discussions
4.1. Doctrines4.2. Information warfare: definitions, models; 4.3. Information warfare or data warfare?; Conclusion; Index; End User License Agreement |
Record Nr. | UNINA-9910136251303321 |
Ventre Daniel | ||
London, England ; ; Hoboken, New Jersey : , : iSTE : , : Wiley, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information warfare / / Daniel Ventre |
Autore | Ventre Daniel |
Edizione | [Revised and updated second edition.] |
Pubbl/distr/stampa | London, England ; ; Hoboken, New Jersey : , : iSTE : , : Wiley, , 2016 |
Descrizione fisica | 1 online resource (270 p.) |
Disciplina | 355.343 |
Collana |
Information systems, web and pervasive computing series
THEi Wiley ebooks |
Soggetto topico |
Information warfare
Business intelligence Trade secrets Information technology - Security measures Computer security - Management Data protection |
ISBN |
1-119-27734-5
1-119-00472-1 1-119-27731-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Table of Contents; Title; Copyright; Introduction; 1 The United States; 1.1. Information warfare in the 1990s; 1.2. Information warfare in the 2000s; 1.3. Information warfare in the 2010s; 1.4. Important concepts and reflections; 2 China; 2.1. Significant publications; 2.2. Strategic and doctrinal thinking about information warfare. Genesis; 2.3. Recent policies and strategies on information and cyber security; 2.4. Reflections; 3 Russia; 3.1. Military doctrines and national security strategies; 3.2. Information warfare in practice; 3.3. Comments; 4 Concepts and Theories: Discussions
4.1. Doctrines4.2. Information warfare: definitions, models; 4.3. Information warfare or data warfare?; Conclusion; Index; End User License Agreement |
Record Nr. | UNINA-9910828680503321 |
Ventre Daniel | ||
London, England ; ; Hoboken, New Jersey : , : iSTE : , : Wiley, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Introduction to cyber-warfare : a multidisciplinary approach / Paulo Shakarian, Jana Shakarian, Andrew Ruef ; foreward by Sushil Jajodia |
Autore | SHAKARIAN, Paulo |
Pubbl/distr/stampa | Amsterdam [etc.], : Syngress, 2013 |
Descrizione fisica | XVII, 318 p. : ill. ; 24 cm |
Disciplina | 355.343 |
Altri autori (Persone) |
SHAKARIAN, Jana
RUEF, Andrew |
Soggetto topico | Guerra - Impiego [della] Cibernetica |
ISBN | 978-0-12-407814-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996407748803316 |
SHAKARIAN, Paulo | ||
Amsterdam [etc.], : Syngress, 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Journal of information warfare |
Pubbl/distr/stampa | [Victoria, Australia] : , : [Teamlink Australia Pty Ltd.] |
Disciplina | 355.343 |
Soggetto topico | Information warfare |
Soggetto genere / forma | Periodicals. |
Soggetto non controllato | Military Science - General |
ISSN | 1445-3347 |
Formato | Materiale a stampa |
Livello bibliografico | Periodico |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996336732903316 |
[Victoria, Australia] : , : [Teamlink Australia Pty Ltd.] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
L'arte del servizio segreto / Allen Dulles |
Autore | Dulles, Allen Welsh <1893-1969> |
Pubbl/distr/stampa | Milano : Garzanti, 1963 |
Descrizione fisica | 325 p. ; 22 cm |
Disciplina | 355.343 |
Soggetto non controllato | Spionaggio e controspionaggio |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | ita |
Record Nr. | UNINA-990006739100403321 |
Dulles, Allen Welsh <1893-1969> | ||
Milano : Garzanti, 1963 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
La Campagna d'Italia e i servizi segreti : la storia dell'ORI (1943-1945) / Raimondo Craveri |
Autore | Craveri, Raimondo |
Pubbl/distr/stampa | Milano : La Pietra, 1980 |
Descrizione fisica | 336 p. ; 21 cm |
Disciplina | 355.343 |
Collana | Protagonisti |
Soggetto non controllato | Spionaggio e controspionaggio - Guerra mondiale 1939-1945 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | ita |
Record Nr. | UNINA-990004032020403321 |
Craveri, Raimondo | ||
Milano : La Pietra, 1980 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
National security drivers of Ukraine : information technology, strategic communication, and legitimacy / / Oleksandr Radchenko [et al.], editors |
Edizione | [First edition.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer Nature Switzerland AG, , [2023] |
Descrizione fisica | 1 online resource (xiii, 316 pages) : illustrations (some color) |
Disciplina | 355.343 |
Collana | Contributions to Political Science |
Soggetto topico |
Information warfare
International relations National security - Ukraine Security, International |
ISBN | 3-031-33724-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Part 1. National Security: Theoretical and Methodological Approaches -- Chapter 1. Review of the Ukrainian Discourse Field of National Security Issues of the Modern State -- Chapter 2. Societal Content and Main Determinants of “National Security” Phenomenon in the Information and Communication Context -- Chapter 3. Systematization of Main Threats to the National Security of the State in Modern Conditions -- Part 2. Informational Security Phenomenon -- Chapter 4. Post Industrial Society and Global Informational Space as Infrastructure Medium and Factor for Actualization of the State Informational Security -- Chapter 5. Substantive Essence and Components of the Societal Phenomenon “Information Security” in the Age of Information Society -- Chapter 6. Formation of Information Security Systems of the State: Current Status, Trends and Problems -- Part 3. Strategic Communications -- Chapter 7. Theoretical Models of Information and Communication Interaction of State and Society in the Context of National Security -- Chapter 8. Place and Role of Strategic Communications in Public Management System -- Chapter 9. Structure and Function of Strategic Communications in the System of National and Informational State Security -- Chapter 10. Current State of Strategic Communications in Ukraine and Their Functional Influence on Efficiency of State Management System -- Part 4. Legitimacy and Legitimation -- Chapter 11. Essence and Content of State-Administrative Duality “Legitimacy” – “Legitimation” and its Place in the Information Security System of the Modern State -- Chapter 12. Comparative Analysis of Conceptual Models of Power Legitimation in Authoritarian, Democratic and Transitional Societies -- Chapter 13. Project Approach in the Executive Bodies Activity of United Territorial Communities as a Modern Mechanism of Local Public Authorities’ Legitimation in Ukraine -- Chapter 14. “Legitimacy Crisis” and its Impact on the Stability and Security of the System of Public Authorities of the State During the Formation of the Global Information Space -- Part 5. Informational Wars -- Chapter 15. Information Wars: Historical and Comparative Analysis, Specifics and Factors of Actualization in the Modern World -- Chapter 16. Information Weapons: Forms and Technologies of Modern Information Wars -- Chapter 17. Tools for Counteracting Information Aggression Use of Elements of Information War in Ukraine -- Chapter 18. Mental and Value Features of Ukrainian Society in the Context of “Civilizations Clash” as the Main Object of Information War in Ukraine. |
Record Nr. | UNINA-9910746096903321 |
Cham, Switzerland : , : Springer Nature Switzerland AG, , [2023] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
North Korea's cyber operations : strategy and responses / / Jenny Jun, Scott LaFoy, Ethan Sohn ; project director |
Autore | Jun Jenny |
Pubbl/distr/stampa | Lanham, Maryland : , : Rowman & Littlefield, , 2015 |
Descrizione fisica | 1 online resource (106 p.) |
Disciplina | 355.343 |
Collana | CSIS Reports |
Soggetto topico |
Cyberspace operations (Military science) - Korea (North)
Cyberterrorism - Prevention Computer networks - Security measures |
ISBN | 1-4422-5903-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
North Korea's Cyber Operations ; Contents ; Preface ; Acknowledgments ; Abbreviations ; Introduction ; Purpose, Scope, and Methods ; A Note on Open-Source Reporting on DPRK ; Executive Summary ; 1. Strategic Context ; DPRK Military and Political Strategy ; Strategic Use of Cyberspace ; DPRK Cyber Strategy ; 2. Organization ; Reconnaissance General Bureau ; General Staff Department of the Korean People's Army ; Technology and Industrial Base ; 3. Future Trends and Policy Recommendations ; Future Trends ; Policy Objectives ; Recommendations for the United States
Recommendations for the U.S.-ROK Alliance Appendix. Disruptive Cyber Operations Commonly Associated with North Korea ; Bibliography ; About the Project Directors and Authors |
Record Nr. | UNINA-9910797949303321 |
Jun Jenny | ||
Lanham, Maryland : , : Rowman & Littlefield, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
North Korea's cyber operations : strategy and responses / / Jenny Jun, Scott LaFoy, Ethan Sohn ; project director |
Autore | Jun Jenny |
Pubbl/distr/stampa | Lanham, Maryland : , : Rowman & Littlefield, , 2015 |
Descrizione fisica | 1 online resource (106 p.) |
Disciplina | 355.343 |
Collana | CSIS Reports |
Soggetto topico |
Cyberspace operations (Military science) - Korea (North)
Cyberterrorism - Prevention Computer networks - Security measures |
ISBN | 1-4422-5903-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
North Korea's Cyber Operations ; Contents ; Preface ; Acknowledgments ; Abbreviations ; Introduction ; Purpose, Scope, and Methods ; A Note on Open-Source Reporting on DPRK ; Executive Summary ; 1. Strategic Context ; DPRK Military and Political Strategy ; Strategic Use of Cyberspace ; DPRK Cyber Strategy ; 2. Organization ; Reconnaissance General Bureau ; General Staff Department of the Korean People's Army ; Technology and Industrial Base ; 3. Future Trends and Policy Recommendations ; Future Trends ; Policy Objectives ; Recommendations for the United States
Recommendations for the U.S.-ROK Alliance Appendix. Disruptive Cyber Operations Commonly Associated with North Korea ; Bibliography ; About the Project Directors and Authors |
Record Nr. | UNINA-9910814330203321 |
Jun Jenny | ||
Lanham, Maryland : , : Rowman & Littlefield, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|