top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Il processo di produzione del capitale / Karl Marx ; a cura di Eugenio Sbardella
Il processo di produzione del capitale / Karl Marx ; a cura di Eugenio Sbardella
Autore Marx, Karl <1818-1883>
Pubbl/distr/stampa Roma : Newton Compton, 1970
Descrizione fisica L, 1048 p. ; 22 cm
Disciplina 355.4
Collana Paperbacks marxisti
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione ita
Record Nr. UNINA-990007449380403321
Marx, Karl <1818-1883>  
Roma : Newton Compton, 1970
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Improving capacity for stabilization and reconstruction operations / / Nora Bensahel, Olga Oliker, Heather Peterson
Improving capacity for stabilization and reconstruction operations / / Nora Bensahel, Olga Oliker, Heather Peterson
Autore Bensahel Nora <1971->
Pubbl/distr/stampa Santa Monica, CA, : RAND, 2009
Descrizione fisica 1 online resource (xxi, 81 pages)
Disciplina 355.4
Altri autori (Persone) OlikerOlga
PetersonHeather
Collana Rand Corporation monograph series
Soggetto topico Integrated operations (Military science)
Soggetto genere / forma Electronic books.
ISBN 1-282-28278-6
9786612282782
0-8330-4725-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Preface; Contents; Figure and Table; Summary; Acknowledgments; Abbreviations; CHAPTER ONE Why Stabilization and Reconstruction?; What Are Stabilization and Reconstruction?; Who Conducts Stabilization and Reconstruction Tasks?; The Challenge of Building and Leveraging Capacity; CHAPTER TWO What Do Stabilization and Reconstruction Operations Entail?; Operational Requirements; Defining Capacity Requirements; Developing Capacity; CHAPTER THREE Recent Efforts to Build Capacity
The Office of the Coordinator for Reconstruction and Stabilization: Creation, Interagency Direction, and LegislationS/CRS Concepts for Planning and Conducting Operations; Efforts to Develop Civilian Capacity; Remaining Challenges; Conclusion; CHAPTER FOUR Conclusions and Recommendations; Emphasize Civilian Rather Than Military Capacity; Realign NSC, State, and USAID Roles; Fund and Implement the Civilian Stabilization Initiative; Improve Deployable Police Capacity; Improve Management for Stabilization and Reconstruction
Ensure Coherent Guidance and Funding for Effectiveness and Sustainability Bibliography
Record Nr. UNINA-9910220130603321
Bensahel Nora <1971->  
Santa Monica, CA, : RAND, 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Warfare : Forging Communication Strategies for Twenty-first Century Operational Environments / / by James P. Farwell
Information Warfare : Forging Communication Strategies for Twenty-first Century Operational Environments / / by James P. Farwell
Autore Farwell James P.
Pubbl/distr/stampa Quantico, VA : , : Marine Corps University Press, , 2020
Descrizione fisica 1 online resource ( xvii, 178 p)
Disciplina 355.4
Soggetto topico Communication
Strategy
Information warfare
Soggetto genere / forma Electronic books.
ISBN 1-7370404-4-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910524672903321
Farwell James P.  
Quantico, VA : , : Marine Corps University Press, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information warfare 2012 : armi cibernetiche e processo decisionale / a cura di Umberto Gori e Serena Lisi
Information warfare 2012 : armi cibernetiche e processo decisionale / a cura di Umberto Gori e Serena Lisi
Pubbl/distr/stampa Milano : Franco Angeli, c2013
Descrizione fisica 215 p. : ill. ; 23 cm
Disciplina 355.4
Collana Collana di scienza politica e relazioni internazionali
Soggetto non controllato CiberneticiCongressi2012
Sicurezza pubblicaReati informaticiPrevenzioneCongressi2012
ISBN 978-88-204-4014-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione ita
Record Nr. UNIPARTHENOPE-000029885
Milano : Franco Angeli, c2013
Materiale a stampa
Lo trovi qui: Univ. Parthenope
Opac: Controlla la disponibilità qui
Insights from selected case studies [[electronic resource] /] / Angel Rabasa ... [et al.]
Insights from selected case studies [[electronic resource] /] / Angel Rabasa ... [et al.]
Pubbl/distr/stampa Santa Monica, Calif., : RAND Corporation, 2011
Descrizione fisica 1 online resource (321 p.)
Disciplina 327.73
355.4
355.425
Altri autori (Persone) RabasaAngel
Collana From insurgency to stability
Soggetto topico Counterinsurgency
Peace-building
ISBN 1-283-59733-0
9786613909787
0-8330-5317-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright; Preface; Contents; Figures and Maps; Tables; Summary; Acknowledgments; Abbreviations; Chapter One: Introduction; Background; The Transition from Counterinsurgency to Stability; The Case Studies; Chapter Two: The Philippines; Introduction: Background of the Communist Conflict in the Philippines; Counterinsurgency Under Marcos; The Post-Marcos Period; Strategy; CPP/NPA; The Philippine State; Self-Defense Militias; AFP COIN Progress; Transition?; Conclusion: Lessons for the United States; Chapter Three: Counterinsurgency Transition Case Study: Colombia
Nature and Scope of the ConflictInternational and Transnational Actors; Strategy (Pre-Transition); Colombian Government Strategy; Insurgent Strategy; External Powers Supporting Belligerents; Key Strengths and Weaknesses of the Strategies; How the Parties Define "Victory"; The Transition Period; Managing the Transition; Institutional Framework: Theory and Practice; Stages of Transition; Implementation: What Is the Actual Experience of the ColombianTransition?; Gaps; Conclusions; Assessment of Colombian Transition Plan; Prospects for the Future
What Capabilities Does the United States Need to Have or Need toDevelop?Chapter Four: Counterinsurgency Transition Case Study: El Salvador; Introduction; Strategy (Pre-Transition); The Transition Period; Domestic Factors; The United States' Role; The Role of the International Community; Managing the Transition; Ceasefire and Demobilization; Public Security and Security-Sector Reform; ESAF Reform; Police Reform; Human Rights, Truth and Reconciliation; Addressing the Factors Contributing to the Insurgency; Conclusions; A Successful Transition?; Lessons Learned
Chapter Five: The Tuareg Insurgency in Mali, 2006-2009Introduction; Background: Mali's North-South Divide; A History of Contestation; Phase 1: The ADC Rebellion, May-July 2006; Introduction: Brief History of the Conflict Leading Up to thePeriod of Transition; Strategy (Pre-Transition); The Transition Period; Managing the Transition; Phase 2: The ATNM Rebellion (May 2007-February 2009); Introduction: Brief History of the Conflict Leading Up to thePeriod of Transition; Strategy (Pre-Transition); The Transition Period; Managing the Transition; Conclusions
Chapter Six: The Transition in Al-Anbar, IraqIntroduction; A Brief History of the Conflict in Al-Anbar Province; Pre-Transition Strategy, 2005-2006; Insurgent Strategies in the Pre-Transition Period; External Powers Supporting the Anbar Insurgents; Counterinsurgency and Transition, 2006-2008; The Transition in Anbar: Contributing Factors; False Starts and Missed Opportunities on the Road to Transition; External Actors' Understanding of the Changing ConflictDynamics; Setting the Stage for and Managing the Transition; Transition Process Components; Signs the Coalition Forces Were "Winning"
The Transition Outcome in Al-Anbar
Record Nr. UNINA-9910220157703321
Santa Monica, Calif., : RAND Corporation, 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Integrating civilian agencies in stability operations [[electronic resource] /] / Thomas S. Szayna [et al.]
Integrating civilian agencies in stability operations [[electronic resource] /] / Thomas S. Szayna [et al.]
Pubbl/distr/stampa Santa Monica, CA, : RAND, 2009
Descrizione fisica 1 online resource (xxxii, 167 pages) : illustrations
Disciplina 355.4
Altri autori (Persone) SzaynaThomas S. <1960->
Soggetto topico Integrated operations (Military science)
Interagency coordination - United States
Civil-military relations - United States
Postwar reconstruction - Government policy - United States
Soggetto genere / forma Electronic books.
ISBN 0-8330-4895-3
9786612398551
1-282-39855-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; List of Abbreviations; CHAPTER ONE - Introduction; The Context; Objectives and Organization; CHAPTER 2 - Identifying the Key Agencies: The Top-Down Approach; Introduction; Task-Based Assessment of Interagency Partners; Budget-Based Assessment of Interagency Partners; Conclusion: Main Agencies; CHAPTER 3 - Identifying the Key Agencies: The Bottom-Up Approach; Introduction; Provincial Reconstruction Teams; Defining the Goal for Interagency Teams; Capabilities Required in Tactical Teams
Mission Statement and Mission-Essential Tasks for Interagency Teams Identifying Civilian Occupations to Augment Tactical Interagency Teams; CHAPTER 4 - Problems of Civilian Agency Participation in SSTR Operations; Introduction; Civilian Agencies: Required Capabilities But Limited Capacity; Obstacles to More Effective Civilian Participation; CHAPTER 5 - Building Interagency Collaborative Networks; Introduction; Incentive Problems; Types of Collaboration; CHAPTER 6 - Options for More Effective Civilian Agency Participation in SSTR Operations; Introduction; What Are the Goals?
National-Level Options DoD-Level Options; Army-Level Options; Arraying the Options in Terms of Leverage and Fallback; "Whole of Government" Staffing Approach; Planning Tools; APPENDIX - Additional Materials; Bibliography; APPENDIX A - Inputs, Outputs, and Outcomes of PRT Capabilities; APPENDIX B - Evaluation of Occupations by Capabilities and Tasks; APPENDIX C - Utilizing FEDScope to Locate Personnel for a FACT; APPENDIX D - Observations on Interagency Training Program
Record Nr. UNINA-9910220130203321
Santa Monica, CA, : RAND, 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
An introduction to cyber analysis and targeting / / Jerry M. Couretas
An introduction to cyber analysis and targeting / / Jerry M. Couretas
Autore Couretas Jerry M. <1966->
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (325 pages)
Disciplina 355.4
Soggetto topico Cyberspace operations (Military science)
ISBN 3-030-88559-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910523806503321
Couretas Jerry M. <1966->  
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
An introduction to cyber analysis and targeting / / Jerry M. Couretas
An introduction to cyber analysis and targeting / / Jerry M. Couretas
Autore Couretas Jerry M. <1966->
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (325 pages)
Disciplina 355.4
Soggetto topico Cyberspace operations (Military science)
ISBN 3-030-88559-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996464540403316
Couretas Jerry M. <1966->  
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Introduction to cyber-warfare [[electronic resource] ] : a multidisciplinary approach / / Paulo Shakarian, Jana Shakarian, Andrew Ruef ; foreword by Sushil Jajodia
Introduction to cyber-warfare [[electronic resource] ] : a multidisciplinary approach / / Paulo Shakarian, Jana Shakarian, Andrew Ruef ; foreword by Sushil Jajodia
Autore Shakarian Paulo
Edizione [1st edition]
Pubbl/distr/stampa Amsterdam [Netherlands], : Morgan Kaufmann Publishers, an imprint of Elsevier, 2013
Descrizione fisica 1 online resource (256 p.)
Disciplina 355.4
Altri autori (Persone) ShakarianJana
RuefAndrew
Soggetto topico Information warfare
Cyberterrorism
Cyberspace - Security measures
Computer crimes
Data protection
Soggetto genere / forma Electronic books.
ISBN 0-12-407926-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Introduction to Cyber-Warfare: A Multidisciplinary Approach; Copyright; Contents; Preface; Foreword; Introduction; References; Biography; Chapter 1: Cyber Warfare: Here and Now; What Is Cyber War?; Is Cyber War a Credible Threat?; Attribution, Deception, and Intelligence; Origin; Structure; Purpose; Information Assurance; References; Part: I Cyber Attack; Chapter 2: Political Cyber Attack Comes of Age in 2007; Reliance on Information as a Vulnerability; Rudimentary but Effective: Denial of Service; Leaving Unwanted Messages: Web Site Defacement; Tools for Denial of Service
The Difficulty of Assigning Blame: Why Attribution Is Tough in a DDoS AttackEstonia Is Hit by Cyber Attacks; The Estonian Government ́s Response; The End of the Attacks; General Response to DDoS; Summary; Suggested Further Reading; References; Chapter 3: How Cyber Attacks Augmented Russian Military Operations; The 2008 Russian Cyber Campaign Against Georgia; What Is Interesting About the Russian Cyber Campaign; Objectives of the Attack; Coordination with Conventional Forces; Reconnaissance and Preparation; Attribution; Preparing for a Cyber-Capable Adversary
Cyber as a Battlefield Operating SystemThe Cyber Aspect of the Area of Interest; Cyber Reconnaissance and Surveillance (R&S); Summary; Suggested Further Reading; References; Chapter 4: When Who Tells the Best Story Wins: Cyber and Information Operations in the Middle East; Hijacking Noncombatant Civilian IP Addresses to Help the War Effort: The Israel-Hezbollah ``July War ́ ́ of 2006; The Information Operations of Hezbollah; Hezbollah Hijacks IP Addresses; Civilians in the Cyber Melee: Operation Cast Lead; IO and Cyber Warfare in the 2008 Israel-Hamas War; Summary; Suggested Further Reading
ReferencesChapter 5: Limiting Free Speech on the Internet: Cyber Attack Against Internal Dissidents in Iran and Russia; DDoS as a Censorship Tool: Why Dissident Groups Are Inherently Vulnerable to Cyber Attacks; Silencing Novaya Gazeta and Other Russian Dissidents; Moving to LiveJournal; Possible Motivation for the 2011 DDoS; The Optima/Darkness Botnet; The ``March(es) of Millions ́ ́; Iran-How the 2009 Elections Led to Aggressive Cyber Operations; The 2009 Elections; The Iranian Cyber Army (ICA); ICA: Beyond Domain Name Hijacking; Who Controls the ICA?; Alleged Iranian Botnet Strikes
The Iranian Cyber PoliceSummary; References; Chapter 6: Cyber Attacks by Nonstate Hacking Groups: The Case of Anonymous and Its Affiliates; ``Chaotic ́ ́ Beginnings: The Chaos Computer Club, CCC; The Roots of the Anon-4chan, 7chan, and Other Message Boards; How We Are Influenced by 4chan: Memes; Anonymous-On Image, Structure, and Motivation; Anonymous-External Connections and Spin Offs; Your Security Is a Joke: LulzSec; Anonymous ́ Modus Operandi; Targeting Governments, Corporations, and Individuals: Notable Hacks on Anonymous; Habbo Hotel Raids; Internet Vigilantism; Project Chanology
Arab Spring
Record Nr. UNISA-996426339703316
Shakarian Paulo  
Amsterdam [Netherlands], : Morgan Kaufmann Publishers, an imprint of Elsevier, 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Introduction to cyber-warfare [[electronic resource] ] : a multidisciplinary approach / / Paulo Shakarian, Jana Shakarian, Andrew Ruef ; foreword by Sushil Jajodia
Introduction to cyber-warfare [[electronic resource] ] : a multidisciplinary approach / / Paulo Shakarian, Jana Shakarian, Andrew Ruef ; foreword by Sushil Jajodia
Autore Shakarian Paulo
Edizione [1st edition]
Pubbl/distr/stampa Amsterdam [Netherlands], : Morgan Kaufmann Publishers, an imprint of Elsevier, 2013
Descrizione fisica 1 online resource (256 p.)
Disciplina 355.4
Altri autori (Persone) ShakarianJana
RuefAndrew
Soggetto topico Information warfare
Cyberterrorism
Cyberspace - Security measures
Computer crimes
Data protection
Soggetto genere / forma Electronic books.
ISBN 0-12-407926-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Introduction to Cyber-Warfare: A Multidisciplinary Approach; Copyright; Contents; Preface; Foreword; Introduction; References; Biography; Chapter 1: Cyber Warfare: Here and Now; What Is Cyber War?; Is Cyber War a Credible Threat?; Attribution, Deception, and Intelligence; Origin; Structure; Purpose; Information Assurance; References; Part: I Cyber Attack; Chapter 2: Political Cyber Attack Comes of Age in 2007; Reliance on Information as a Vulnerability; Rudimentary but Effective: Denial of Service; Leaving Unwanted Messages: Web Site Defacement; Tools for Denial of Service
The Difficulty of Assigning Blame: Why Attribution Is Tough in a DDoS AttackEstonia Is Hit by Cyber Attacks; The Estonian Government ́s Response; The End of the Attacks; General Response to DDoS; Summary; Suggested Further Reading; References; Chapter 3: How Cyber Attacks Augmented Russian Military Operations; The 2008 Russian Cyber Campaign Against Georgia; What Is Interesting About the Russian Cyber Campaign; Objectives of the Attack; Coordination with Conventional Forces; Reconnaissance and Preparation; Attribution; Preparing for a Cyber-Capable Adversary
Cyber as a Battlefield Operating SystemThe Cyber Aspect of the Area of Interest; Cyber Reconnaissance and Surveillance (R&S); Summary; Suggested Further Reading; References; Chapter 4: When Who Tells the Best Story Wins: Cyber and Information Operations in the Middle East; Hijacking Noncombatant Civilian IP Addresses to Help the War Effort: The Israel-Hezbollah ``July War ́ ́ of 2006; The Information Operations of Hezbollah; Hezbollah Hijacks IP Addresses; Civilians in the Cyber Melee: Operation Cast Lead; IO and Cyber Warfare in the 2008 Israel-Hamas War; Summary; Suggested Further Reading
ReferencesChapter 5: Limiting Free Speech on the Internet: Cyber Attack Against Internal Dissidents in Iran and Russia; DDoS as a Censorship Tool: Why Dissident Groups Are Inherently Vulnerable to Cyber Attacks; Silencing Novaya Gazeta and Other Russian Dissidents; Moving to LiveJournal; Possible Motivation for the 2011 DDoS; The Optima/Darkness Botnet; The ``March(es) of Millions ́ ́; Iran-How the 2009 Elections Led to Aggressive Cyber Operations; The 2009 Elections; The Iranian Cyber Army (ICA); ICA: Beyond Domain Name Hijacking; Who Controls the ICA?; Alleged Iranian Botnet Strikes
The Iranian Cyber PoliceSummary; References; Chapter 6: Cyber Attacks by Nonstate Hacking Groups: The Case of Anonymous and Its Affiliates; ``Chaotic ́ ́ Beginnings: The Chaos Computer Club, CCC; The Roots of the Anon-4chan, 7chan, and Other Message Boards; How We Are Influenced by 4chan: Memes; Anonymous-On Image, Structure, and Motivation; Anonymous-External Connections and Spin Offs; Your Security Is a Joke: LulzSec; Anonymous ́ Modus Operandi; Targeting Governments, Corporations, and Individuals: Notable Hacks on Anonymous; Habbo Hotel Raids; Internet Vigilantism; Project Chanology
Arab Spring
Record Nr. UNINA-9910459153503321
Shakarian Paulo  
Amsterdam [Netherlands], : Morgan Kaufmann Publishers, an imprint of Elsevier, 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui

Data di pubblicazione

Altro...