Il processo di produzione del capitale / Karl Marx ; a cura di Eugenio Sbardella |
Autore | Marx, Karl <1818-1883> |
Pubbl/distr/stampa | Roma : Newton Compton, 1970 |
Descrizione fisica | L, 1048 p. ; 22 cm |
Disciplina | 355.4 |
Collana | Paperbacks marxisti |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | ita |
Record Nr. | UNINA-990007449380403321 |
Marx, Karl <1818-1883> | ||
Roma : Newton Compton, 1970 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Improving capacity for stabilization and reconstruction operations / / Nora Bensahel, Olga Oliker, Heather Peterson |
Autore | Bensahel Nora <1971-> |
Pubbl/distr/stampa | Santa Monica, CA, : RAND, 2009 |
Descrizione fisica | 1 online resource (xxi, 81 pages) |
Disciplina | 355.4 |
Altri autori (Persone) |
OlikerOlga
PetersonHeather |
Collana | Rand Corporation monograph series |
Soggetto topico | Integrated operations (Military science) |
Soggetto genere / forma | Electronic books. |
ISBN |
1-282-28278-6
9786612282782 0-8330-4725-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Preface; Contents; Figure and Table; Summary; Acknowledgments; Abbreviations; CHAPTER ONE Why Stabilization and Reconstruction?; What Are Stabilization and Reconstruction?; Who Conducts Stabilization and Reconstruction Tasks?; The Challenge of Building and Leveraging Capacity; CHAPTER TWO What Do Stabilization and Reconstruction Operations Entail?; Operational Requirements; Defining Capacity Requirements; Developing Capacity; CHAPTER THREE Recent Efforts to Build Capacity
The Office of the Coordinator for Reconstruction and Stabilization: Creation, Interagency Direction, and LegislationS/CRS Concepts for Planning and Conducting Operations; Efforts to Develop Civilian Capacity; Remaining Challenges; Conclusion; CHAPTER FOUR Conclusions and Recommendations; Emphasize Civilian Rather Than Military Capacity; Realign NSC, State, and USAID Roles; Fund and Implement the Civilian Stabilization Initiative; Improve Deployable Police Capacity; Improve Management for Stabilization and Reconstruction Ensure Coherent Guidance and Funding for Effectiveness and Sustainability Bibliography |
Record Nr. | UNINA-9910220130603321 |
Bensahel Nora <1971-> | ||
Santa Monica, CA, : RAND, 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information Warfare : Forging Communication Strategies for Twenty-first Century Operational Environments / / by James P. Farwell |
Autore | Farwell James P. |
Pubbl/distr/stampa | Quantico, VA : , : Marine Corps University Press, , 2020 |
Descrizione fisica | 1 online resource ( xvii, 178 p) |
Disciplina | 355.4 |
Soggetto topico |
Communication
Strategy Information warfare |
Soggetto genere / forma | Electronic books. |
ISBN | 1-7370404-4-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910524672903321 |
Farwell James P. | ||
Quantico, VA : , : Marine Corps University Press, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information warfare 2012 : armi cibernetiche e processo decisionale / a cura di Umberto Gori e Serena Lisi |
Pubbl/distr/stampa | Milano : Franco Angeli, c2013 |
Descrizione fisica | 215 p. : ill. ; 23 cm |
Disciplina | 355.4 |
Collana | Collana di scienza politica e relazioni internazionali |
Soggetto non controllato |
CiberneticiCongressi2012
Sicurezza pubblicaReati informaticiPrevenzioneCongressi2012 |
ISBN | 978-88-204-4014-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | ita |
Record Nr. | UNIPARTHENOPE-000029885 |
Milano : Franco Angeli, c2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Parthenope | ||
|
Insights from selected case studies [[electronic resource] /] / Angel Rabasa ... [et al.] |
Pubbl/distr/stampa | Santa Monica, Calif., : RAND Corporation, 2011 |
Descrizione fisica | 1 online resource (321 p.) |
Disciplina |
327.73
355.4 355.425 |
Altri autori (Persone) | RabasaAngel |
Collana | From insurgency to stability |
Soggetto topico |
Counterinsurgency
Peace-building |
ISBN |
1-283-59733-0
9786613909787 0-8330-5317-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Title Page; Copyright; Preface; Contents; Figures and Maps; Tables; Summary; Acknowledgments; Abbreviations; Chapter One: Introduction; Background; The Transition from Counterinsurgency to Stability; The Case Studies; Chapter Two: The Philippines; Introduction: Background of the Communist Conflict in the Philippines; Counterinsurgency Under Marcos; The Post-Marcos Period; Strategy; CPP/NPA; The Philippine State; Self-Defense Militias; AFP COIN Progress; Transition?; Conclusion: Lessons for the United States; Chapter Three: Counterinsurgency Transition Case Study: Colombia
Nature and Scope of the ConflictInternational and Transnational Actors; Strategy (Pre-Transition); Colombian Government Strategy; Insurgent Strategy; External Powers Supporting Belligerents; Key Strengths and Weaknesses of the Strategies; How the Parties Define "Victory"; The Transition Period; Managing the Transition; Institutional Framework: Theory and Practice; Stages of Transition; Implementation: What Is the Actual Experience of the ColombianTransition?; Gaps; Conclusions; Assessment of Colombian Transition Plan; Prospects for the Future What Capabilities Does the United States Need to Have or Need toDevelop?Chapter Four: Counterinsurgency Transition Case Study: El Salvador; Introduction; Strategy (Pre-Transition); The Transition Period; Domestic Factors; The United States' Role; The Role of the International Community; Managing the Transition; Ceasefire and Demobilization; Public Security and Security-Sector Reform; ESAF Reform; Police Reform; Human Rights, Truth and Reconciliation; Addressing the Factors Contributing to the Insurgency; Conclusions; A Successful Transition?; Lessons Learned Chapter Five: The Tuareg Insurgency in Mali, 2006-2009Introduction; Background: Mali's North-South Divide; A History of Contestation; Phase 1: The ADC Rebellion, May-July 2006; Introduction: Brief History of the Conflict Leading Up to thePeriod of Transition; Strategy (Pre-Transition); The Transition Period; Managing the Transition; Phase 2: The ATNM Rebellion (May 2007-February 2009); Introduction: Brief History of the Conflict Leading Up to thePeriod of Transition; Strategy (Pre-Transition); The Transition Period; Managing the Transition; Conclusions Chapter Six: The Transition in Al-Anbar, IraqIntroduction; A Brief History of the Conflict in Al-Anbar Province; Pre-Transition Strategy, 2005-2006; Insurgent Strategies in the Pre-Transition Period; External Powers Supporting the Anbar Insurgents; Counterinsurgency and Transition, 2006-2008; The Transition in Anbar: Contributing Factors; False Starts and Missed Opportunities on the Road to Transition; External Actors' Understanding of the Changing ConflictDynamics; Setting the Stage for and Managing the Transition; Transition Process Components; Signs the Coalition Forces Were "Winning" The Transition Outcome in Al-Anbar |
Record Nr. | UNINA-9910220157703321 |
Santa Monica, Calif., : RAND Corporation, 2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Integrating civilian agencies in stability operations [[electronic resource] /] / Thomas S. Szayna [et al.] |
Pubbl/distr/stampa | Santa Monica, CA, : RAND, 2009 |
Descrizione fisica | 1 online resource (xxxii, 167 pages) : illustrations |
Disciplina | 355.4 |
Altri autori (Persone) | SzaynaThomas S. <1960-> |
Soggetto topico |
Integrated operations (Military science)
Interagency coordination - United States Civil-military relations - United States Postwar reconstruction - Government policy - United States |
Soggetto genere / forma | Electronic books. |
ISBN |
0-8330-4895-3
9786612398551 1-282-39855-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; List of Abbreviations; CHAPTER ONE - Introduction; The Context; Objectives and Organization; CHAPTER 2 - Identifying the Key Agencies: The Top-Down Approach; Introduction; Task-Based Assessment of Interagency Partners; Budget-Based Assessment of Interagency Partners; Conclusion: Main Agencies; CHAPTER 3 - Identifying the Key Agencies: The Bottom-Up Approach; Introduction; Provincial Reconstruction Teams; Defining the Goal for Interagency Teams; Capabilities Required in Tactical Teams
Mission Statement and Mission-Essential Tasks for Interagency Teams Identifying Civilian Occupations to Augment Tactical Interagency Teams; CHAPTER 4 - Problems of Civilian Agency Participation in SSTR Operations; Introduction; Civilian Agencies: Required Capabilities But Limited Capacity; Obstacles to More Effective Civilian Participation; CHAPTER 5 - Building Interagency Collaborative Networks; Introduction; Incentive Problems; Types of Collaboration; CHAPTER 6 - Options for More Effective Civilian Agency Participation in SSTR Operations; Introduction; What Are the Goals? National-Level Options DoD-Level Options; Army-Level Options; Arraying the Options in Terms of Leverage and Fallback; "Whole of Government" Staffing Approach; Planning Tools; APPENDIX - Additional Materials; Bibliography; APPENDIX A - Inputs, Outputs, and Outcomes of PRT Capabilities; APPENDIX B - Evaluation of Occupations by Capabilities and Tasks; APPENDIX C - Utilizing FEDScope to Locate Personnel for a FACT; APPENDIX D - Observations on Interagency Training Program |
Record Nr. | UNINA-9910220130203321 |
Santa Monica, CA, : RAND, 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
An introduction to cyber analysis and targeting / / Jerry M. Couretas |
Autore | Couretas Jerry M. <1966-> |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (325 pages) |
Disciplina | 355.4 |
Soggetto topico | Cyberspace operations (Military science) |
ISBN | 3-030-88559-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910523806503321 |
Couretas Jerry M. <1966-> | ||
Cham, Switzerland : , : Springer, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
An introduction to cyber analysis and targeting / / Jerry M. Couretas |
Autore | Couretas Jerry M. <1966-> |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (325 pages) |
Disciplina | 355.4 |
Soggetto topico | Cyberspace operations (Military science) |
ISBN | 3-030-88559-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996464540403316 |
Couretas Jerry M. <1966-> | ||
Cham, Switzerland : , : Springer, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Introduction to cyber-warfare [[electronic resource] ] : a multidisciplinary approach / / Paulo Shakarian, Jana Shakarian, Andrew Ruef ; foreword by Sushil Jajodia |
Autore | Shakarian Paulo |
Edizione | [1st edition] |
Pubbl/distr/stampa | Amsterdam [Netherlands], : Morgan Kaufmann Publishers, an imprint of Elsevier, 2013 |
Descrizione fisica | 1 online resource (256 p.) |
Disciplina | 355.4 |
Altri autori (Persone) |
ShakarianJana
RuefAndrew |
Soggetto topico |
Information warfare
Cyberterrorism Cyberspace - Security measures Computer crimes Data protection |
Soggetto genere / forma | Electronic books. |
ISBN | 0-12-407926-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Introduction to Cyber-Warfare: A Multidisciplinary Approach; Copyright; Contents; Preface; Foreword; Introduction; References; Biography; Chapter 1: Cyber Warfare: Here and Now; What Is Cyber War?; Is Cyber War a Credible Threat?; Attribution, Deception, and Intelligence; Origin; Structure; Purpose; Information Assurance; References; Part: I Cyber Attack; Chapter 2: Political Cyber Attack Comes of Age in 2007; Reliance on Information as a Vulnerability; Rudimentary but Effective: Denial of Service; Leaving Unwanted Messages: Web Site Defacement; Tools for Denial of Service
The Difficulty of Assigning Blame: Why Attribution Is Tough in a DDoS AttackEstonia Is Hit by Cyber Attacks; The Estonian Government ́s Response; The End of the Attacks; General Response to DDoS; Summary; Suggested Further Reading; References; Chapter 3: How Cyber Attacks Augmented Russian Military Operations; The 2008 Russian Cyber Campaign Against Georgia; What Is Interesting About the Russian Cyber Campaign; Objectives of the Attack; Coordination with Conventional Forces; Reconnaissance and Preparation; Attribution; Preparing for a Cyber-Capable Adversary Cyber as a Battlefield Operating SystemThe Cyber Aspect of the Area of Interest; Cyber Reconnaissance and Surveillance (R&S); Summary; Suggested Further Reading; References; Chapter 4: When Who Tells the Best Story Wins: Cyber and Information Operations in the Middle East; Hijacking Noncombatant Civilian IP Addresses to Help the War Effort: The Israel-Hezbollah ``July War ́ ́ of 2006; The Information Operations of Hezbollah; Hezbollah Hijacks IP Addresses; Civilians in the Cyber Melee: Operation Cast Lead; IO and Cyber Warfare in the 2008 Israel-Hamas War; Summary; Suggested Further Reading ReferencesChapter 5: Limiting Free Speech on the Internet: Cyber Attack Against Internal Dissidents in Iran and Russia; DDoS as a Censorship Tool: Why Dissident Groups Are Inherently Vulnerable to Cyber Attacks; Silencing Novaya Gazeta and Other Russian Dissidents; Moving to LiveJournal; Possible Motivation for the 2011 DDoS; The Optima/Darkness Botnet; The ``March(es) of Millions ́ ́; Iran-How the 2009 Elections Led to Aggressive Cyber Operations; The 2009 Elections; The Iranian Cyber Army (ICA); ICA: Beyond Domain Name Hijacking; Who Controls the ICA?; Alleged Iranian Botnet Strikes The Iranian Cyber PoliceSummary; References; Chapter 6: Cyber Attacks by Nonstate Hacking Groups: The Case of Anonymous and Its Affiliates; ``Chaotic ́ ́ Beginnings: The Chaos Computer Club, CCC; The Roots of the Anon-4chan, 7chan, and Other Message Boards; How We Are Influenced by 4chan: Memes; Anonymous-On Image, Structure, and Motivation; Anonymous-External Connections and Spin Offs; Your Security Is a Joke: LulzSec; Anonymous ́ Modus Operandi; Targeting Governments, Corporations, and Individuals: Notable Hacks on Anonymous; Habbo Hotel Raids; Internet Vigilantism; Project Chanology Arab Spring |
Record Nr. | UNISA-996426339703316 |
Shakarian Paulo | ||
Amsterdam [Netherlands], : Morgan Kaufmann Publishers, an imprint of Elsevier, 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Introduction to cyber-warfare [[electronic resource] ] : a multidisciplinary approach / / Paulo Shakarian, Jana Shakarian, Andrew Ruef ; foreword by Sushil Jajodia |
Autore | Shakarian Paulo |
Edizione | [1st edition] |
Pubbl/distr/stampa | Amsterdam [Netherlands], : Morgan Kaufmann Publishers, an imprint of Elsevier, 2013 |
Descrizione fisica | 1 online resource (256 p.) |
Disciplina | 355.4 |
Altri autori (Persone) |
ShakarianJana
RuefAndrew |
Soggetto topico |
Information warfare
Cyberterrorism Cyberspace - Security measures Computer crimes Data protection |
Soggetto genere / forma | Electronic books. |
ISBN | 0-12-407926-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Introduction to Cyber-Warfare: A Multidisciplinary Approach; Copyright; Contents; Preface; Foreword; Introduction; References; Biography; Chapter 1: Cyber Warfare: Here and Now; What Is Cyber War?; Is Cyber War a Credible Threat?; Attribution, Deception, and Intelligence; Origin; Structure; Purpose; Information Assurance; References; Part: I Cyber Attack; Chapter 2: Political Cyber Attack Comes of Age in 2007; Reliance on Information as a Vulnerability; Rudimentary but Effective: Denial of Service; Leaving Unwanted Messages: Web Site Defacement; Tools for Denial of Service
The Difficulty of Assigning Blame: Why Attribution Is Tough in a DDoS AttackEstonia Is Hit by Cyber Attacks; The Estonian Government ́s Response; The End of the Attacks; General Response to DDoS; Summary; Suggested Further Reading; References; Chapter 3: How Cyber Attacks Augmented Russian Military Operations; The 2008 Russian Cyber Campaign Against Georgia; What Is Interesting About the Russian Cyber Campaign; Objectives of the Attack; Coordination with Conventional Forces; Reconnaissance and Preparation; Attribution; Preparing for a Cyber-Capable Adversary Cyber as a Battlefield Operating SystemThe Cyber Aspect of the Area of Interest; Cyber Reconnaissance and Surveillance (R&S); Summary; Suggested Further Reading; References; Chapter 4: When Who Tells the Best Story Wins: Cyber and Information Operations in the Middle East; Hijacking Noncombatant Civilian IP Addresses to Help the War Effort: The Israel-Hezbollah ``July War ́ ́ of 2006; The Information Operations of Hezbollah; Hezbollah Hijacks IP Addresses; Civilians in the Cyber Melee: Operation Cast Lead; IO and Cyber Warfare in the 2008 Israel-Hamas War; Summary; Suggested Further Reading ReferencesChapter 5: Limiting Free Speech on the Internet: Cyber Attack Against Internal Dissidents in Iran and Russia; DDoS as a Censorship Tool: Why Dissident Groups Are Inherently Vulnerable to Cyber Attacks; Silencing Novaya Gazeta and Other Russian Dissidents; Moving to LiveJournal; Possible Motivation for the 2011 DDoS; The Optima/Darkness Botnet; The ``March(es) of Millions ́ ́; Iran-How the 2009 Elections Led to Aggressive Cyber Operations; The 2009 Elections; The Iranian Cyber Army (ICA); ICA: Beyond Domain Name Hijacking; Who Controls the ICA?; Alleged Iranian Botnet Strikes The Iranian Cyber PoliceSummary; References; Chapter 6: Cyber Attacks by Nonstate Hacking Groups: The Case of Anonymous and Its Affiliates; ``Chaotic ́ ́ Beginnings: The Chaos Computer Club, CCC; The Roots of the Anon-4chan, 7chan, and Other Message Boards; How We Are Influenced by 4chan: Memes; Anonymous-On Image, Structure, and Motivation; Anonymous-External Connections and Spin Offs; Your Security Is a Joke: LulzSec; Anonymous ́ Modus Operandi; Targeting Governments, Corporations, and Individuals: Notable Hacks on Anonymous; Habbo Hotel Raids; Internet Vigilantism; Project Chanology Arab Spring |
Record Nr. | UNINA-9910459153503321 |
Shakarian Paulo | ||
Amsterdam [Netherlands], : Morgan Kaufmann Publishers, an imprint of Elsevier, 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|