top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
L'affaire Cicéron / L. C. Moyzisch ; adaptation française de Suzanne Belly
L'affaire Cicéron / L. C. Moyzisch ; adaptation française de Suzanne Belly
Autore Moyzisch, Ludwig Carl
Pubbl/distr/stampa Paris : J'ai lu, 1966
Descrizione fisica 192 p. ; 17 cm
Disciplina 355.343
Soggetto topico Guerra mondiale. 1939-1945 - Spionaggio
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione fre
Record Nr. UNISALENTO-991003861519707536
Moyzisch, Ludwig Carl  
Paris : J'ai lu, 1966
Materiale a stampa
Lo trovi qui: Univ. del Salento
Opac: Controlla la disponibilità qui
L'arte del servizio segreto / Allen Dulles
L'arte del servizio segreto / Allen Dulles
Autore Dulles, Allen Welsh
Pubbl/distr/stampa Milano : Garzanti, c1963
Descrizione fisica 325 p. : ill. ; 23 cm
Disciplina 355.343
Altri autori (Persone) Mercatali, Luciano
Collana Memorie e documenti
Soggetto topico Central intelligence agency
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione ita
Record Nr. UNISALENTO-991003443759707536
Dulles, Allen Welsh  
Milano : Garzanti, c1963
Materiale a stampa
Lo trovi qui: Univ. del Salento
Opac: Controlla la disponibilità qui
Behold a pale farce : cyberwar, threat inflation, & the malware industrial complex / / Bill Blunden, Violet Cheung
Behold a pale farce : cyberwar, threat inflation, & the malware industrial complex / / Bill Blunden, Violet Cheung
Autore Blunden Bill
Pubbl/distr/stampa Walterville, OR : , : Trine Day, , [2014]
Descrizione fisica 1 online resource (835 p.)
Disciplina 355.343
Soggetto topico Information warfare
Computer security - United States
ISBN 1-937584-81-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto CoverImage; Title Page; Copyright page; Dedication; Epigraph; Table of Contents; Media Massage; Firsthand Experience; The Public Relations Industry; Behold a Pale Farce; Organization; Acknowledgments; The Wonder of it All; Part I - Rampant Hyperbole; A Backdrop of Metaphors; Never Mind: False Alarm; The Madness of Crowds; An Electronic Pearl Harbor; A Cyber-Katrina; The Hiroshima of Cyberwar; A Cyber 9/11; Dissenting Voices; The Executive Responds; Stuxnet; Plan X; Presidential Policy Directive 20; Hacking Foreign Targets for Years; Oz the Great and Powerful; Our Frenemy in Asia
A Plurality of ActorsRule of Law Breaks Down; The Internet's Frontier Town; Opposing Models for Reform; The Extent of China's Capabilities; Joined at the Hip; Both Sides Keep the Other in Business; The #1 Threat to Economic Security?; Cyberwar as a Misdiagnosis; Dialing 911; Looking Ahead; Part II - A Series of Unfortunate Events; Cybercrime; The Ecosystem; A Snapshot of Cybercrime; The TJX Hack; The Heartland Payment Systems Breach; The DarkMarket Sting; The RBS WorldPay Attack; The Return of the Analyzer; The Ballad of Max Butler; Sony under Siege; The FIS Breach; The Big Picture
The Punch LineEspionage; Moonlight Maze; Titan Rain; Operation Byzantine Hades; GhostNet; Joint Strike Fighter Breach; Operation Aurora; Shadows in the Cloud; Night Dragon; RSA and SecurID; Operation Shady RAT; The Nitro Attacks; Targeting Certificate Authorities; Operation Red October; Patterns Emerge; The Scope of U.S. Espionage; The Malware-Industrial Complex; Independent Operators; Spies Abound ...; But Some Groups Spy More Than Others; The Infrastructure; The Financial System; The Power Grid; The Telecoms; Aerospace; The Internet: Denial of Service Attacks; McAfee
The Internet: Manipulating TrafficThreat Inflation; Conflicts of Interest; Part III - The Futility of Offensive Solutions; The Quandary of Attribution; Achieving Anonymity Online; The Origins of Tor; The Folly of Attribution; Deterrence; Arms Control Treaties; Shades of Orwell; The Golden Age of Surveillance; The NSA's MUSCULAR project; Opting Into Surveillance; The DHS Monitors Social Media; Corporate Compliance; The Hemisphere Project; A Global Panopticon; Coda: Extorting Privacy; Part IV - The Road to Cyber-Security; The Origins of Cyber-Insecurity; A Layered Perspective; Exciting Causes
The Software DepressionPredisposing Causes; Remote Causes; Security for The 1%; Cyber-Security for The 99 Percent; Building Resilient Software; Echoes of Ken Thompson; International Cooperation; Managing Externalities; Catch-22; Strength in Numbers; The Hazards of a Misdiagnosis; Securitization In-Depth; Threat Inflation; The Folly of Deterrence; In Search of Enemies; American Hypocrisy; Subverting Attribution; Turning to Big Brother; Root Causes of Cyber-Insecurity; Cyber-Security for the 1%; Cyber-Security for the 99%; Index
Record Nr. UNINA-9910786684903321
Blunden Bill  
Walterville, OR : , : Trine Day, , [2014]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Behold a pale farce : cyberwar, threat inflation, & the malware industrial complex / / Bill Blunden, Violet Cheung
Behold a pale farce : cyberwar, threat inflation, & the malware industrial complex / / Bill Blunden, Violet Cheung
Autore Blunden Bill
Pubbl/distr/stampa Walterville, OR : , : Trine Day, , [2014]
Descrizione fisica 1 online resource (835 p.)
Disciplina 355.343
Soggetto topico Information warfare
Computer security - United States
ISBN 1-937584-81-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto CoverImage; Title Page; Copyright page; Dedication; Epigraph; Table of Contents; Media Massage; Firsthand Experience; The Public Relations Industry; Behold a Pale Farce; Organization; Acknowledgments; The Wonder of it All; Part I - Rampant Hyperbole; A Backdrop of Metaphors; Never Mind: False Alarm; The Madness of Crowds; An Electronic Pearl Harbor; A Cyber-Katrina; The Hiroshima of Cyberwar; A Cyber 9/11; Dissenting Voices; The Executive Responds; Stuxnet; Plan X; Presidential Policy Directive 20; Hacking Foreign Targets for Years; Oz the Great and Powerful; Our Frenemy in Asia
A Plurality of ActorsRule of Law Breaks Down; The Internet's Frontier Town; Opposing Models for Reform; The Extent of China's Capabilities; Joined at the Hip; Both Sides Keep the Other in Business; The #1 Threat to Economic Security?; Cyberwar as a Misdiagnosis; Dialing 911; Looking Ahead; Part II - A Series of Unfortunate Events; Cybercrime; The Ecosystem; A Snapshot of Cybercrime; The TJX Hack; The Heartland Payment Systems Breach; The DarkMarket Sting; The RBS WorldPay Attack; The Return of the Analyzer; The Ballad of Max Butler; Sony under Siege; The FIS Breach; The Big Picture
The Punch LineEspionage; Moonlight Maze; Titan Rain; Operation Byzantine Hades; GhostNet; Joint Strike Fighter Breach; Operation Aurora; Shadows in the Cloud; Night Dragon; RSA and SecurID; Operation Shady RAT; The Nitro Attacks; Targeting Certificate Authorities; Operation Red October; Patterns Emerge; The Scope of U.S. Espionage; The Malware-Industrial Complex; Independent Operators; Spies Abound ...; But Some Groups Spy More Than Others; The Infrastructure; The Financial System; The Power Grid; The Telecoms; Aerospace; The Internet: Denial of Service Attacks; McAfee
The Internet: Manipulating TrafficThreat Inflation; Conflicts of Interest; Part III - The Futility of Offensive Solutions; The Quandary of Attribution; Achieving Anonymity Online; The Origins of Tor; The Folly of Attribution; Deterrence; Arms Control Treaties; Shades of Orwell; The Golden Age of Surveillance; The NSA's MUSCULAR project; Opting Into Surveillance; The DHS Monitors Social Media; Corporate Compliance; The Hemisphere Project; A Global Panopticon; Coda: Extorting Privacy; Part IV - The Road to Cyber-Security; The Origins of Cyber-Insecurity; A Layered Perspective; Exciting Causes
The Software DepressionPredisposing Causes; Remote Causes; Security for The 1%; Cyber-Security for The 99 Percent; Building Resilient Software; Echoes of Ken Thompson; International Cooperation; Managing Externalities; Catch-22; Strength in Numbers; The Hazards of a Misdiagnosis; Securitization In-Depth; Threat Inflation; The Folly of Deterrence; In Search of Enemies; American Hypocrisy; Subverting Attribution; Turning to Big Brother; Root Causes of Cyber-Insecurity; Cyber-Security for the 1%; Cyber-Security for the 99%; Index
Record Nr. UNINA-9910814722503321
Blunden Bill  
Walterville, OR : , : Trine Day, , [2014]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
CIA : culto e mistica del servizio segreto / Victor Marchetti, John D. Marks
CIA : culto e mistica del servizio segreto / Victor Marchetti, John D. Marks
Autore Marchetti, Victor
Pubbl/distr/stampa Milano : Garzanti, 1976
Descrizione fisica 382 p. ; 18 cm
Disciplina 355.343
Altri autori (Persone) Marks, John D.author
Collana I Garzanti
Soggetto topico Central intelligence agency
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione ita
Record Nr. UNISALENTO-991001193379707536
Marchetti, Victor  
Milano : Garzanti, 1976
Materiale a stampa
Lo trovi qui: Univ. del Salento
Opac: Controlla la disponibilità qui
CIA above the law? : secret detentions and unlawful inter-state transfers of detainees in Europe
CIA above the law? : secret detentions and unlawful inter-state transfers of detainees in Europe
Pubbl/distr/stampa Strasbourg : Council of Europe, 2088
Descrizione fisica 301 p. ; 24 cm
Disciplina 355.343
Soggetto topico Diritti umani - Violazione [da parte della] Central Intelligence Agency - Europa
ISBN 978-92-871-6419-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-990003210790203316
Strasbourg : Council of Europe, 2088
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cognitive superiority : information to power / / Dean S. Hartley III, Kenneth O. Jobson
Cognitive superiority : information to power / / Dean S. Hartley III, Kenneth O. Jobson
Autore Hartley Dean S., III
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (XXIV, 308 p. 65 illus., 62 illus. in color.)
Disciplina 355.343
Soggetto topico Information warfare
Military intelligence
ISBN 3-030-60184-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1: Introduction – Humans and their Matrix -- Chapter 2: The Technium – Tools and Targets of the Conflicts -- Chapter 3: The Noosphere -- Chapter 4: The Target – Humans -- Chapter 5: The Technium – Plus, Redux -- Chapter 6: The adversarial Environment -- Chapter 7: Engagement -- Chapter 8: Conclusion -- Appendix -- Glossary of Selected Terms -- Bibliography -- Index.
Record Nr. UNINA-9910483641303321
Hartley Dean S., III  
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyberwar and information warfare [[electronic resource] /] / edited by Daniel Ventre
Cyberwar and information warfare [[electronic resource] /] / edited by Daniel Ventre
Autore Ventre Daniel
Edizione [1st edition]
Pubbl/distr/stampa London, : ISTE
Descrizione fisica 1 online resource (434 p.)
Disciplina 355.3/43
355.343
Altri autori (Persone) VentreDaniel
Collana ISTE
Soggetto topico Information warfare
Psychological warfare
Computer crimes
Soggetto genere / forma Electronic books.
ISBN 1-118-60348-6
1-299-18789-7
1-118-60339-7
1-118-60351-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Cyberwar and Information Warfare; Title Page; Copyright Page; Table of Contents; Introduction; List of Acronyms; Chapter 1. Cyberwar and its Borders; 1.1. The seduction of cyberwar; 1.2. Desirable, vulnerable and frightening information; 1.3. Conflict and its dimensions; 1.4. The Helm and space; 1.5. Between knowledge and violence; 1.6. Space, distance and paths; 1.7. The permanency of war; 1.8. No war without borders; 1.9. The enemy and the sovereign; 1.10. Strengths and weaknesses; 1.11. Bibliography; Chapter 2. War of Meaning, Cyberwar and Democracies; 2.1. Introduction
2.2. Informational environment, a new operating space for strategy2.2.1. War and information: stakes for the West; 2.2.2. Strategy in the information environment; 2.2.3. Winning the battle of legitimacies; 2.3. Influence strategy: defeating and limiting armed force physical involvement; 2.3.1. Describing the aggressor; 2.3.2. Armed forces and the information environment; 2.3.3. The need for moral force; 2.4. Conclusion; 2.5. Bibliography; Chapter 3. Intelligence, the First Defense? Information Warfare and Strategic Surprise; 3.1. Information warfare, information and war
3.2. Intelligence and strategic surprise3.2.1. Strategic surprise; 3.2.2. Perception of surprise; 3.2.3. Perception of the possibility of surprise; 3.3. Strategic surprise and information warfare; 3.4. Concluding remarks: surprise in strategic studies; 3.5. Bibliography; Chapter 4. Cyberconflict: Stakes of Power; 4.1. Stakes of power; 4.1.1. Power relations; 4.1.2. Expression of sovereignty; 4.1.3. Cyberpower; 4.1.4. Measuring and locating power; 4.1.5. Limits of exercising power; 4.1.6. The Monroe doctrine; 4.1.7. Globalization; 4.1.8. Shock theories; 4.1.9. Naval and maritime power strategy
4.1.10. Air/space and cybernetic power: analogies4.1.11. Cyberconflict/cyber weapons, chemical/biological weapons: comparisons; 4.1.12. Cyberconflict/cyber weapons, Cold War, nuclear weapons: comparisons; 4.1.13. Cyberconflict and new wars; 4.2. The Stuxnet affair; 4.3. Bibliography; Chapter 5. Operational Aspects of a Cyberattack: Intelligence, Planning and Conduct; 5.1. Introduction; 5.2. Towards a broader concept of cyberwar; 5.2.1. War and cyberwar: common ground; 5.2.2. New orders in cyberwar; 5.2.3. Who are cyberwarriors?; 5.2.4. Is formalization possible?
5.3. Concept of critical infrastructure5.3.1. Generalized definition of the notion of critical infrastructure; 5.3.2. System interdependence; 5.4. Different phases of a cyberattack; 5.4.1. Intelligence phase; 5.4.2. Planning phase; 5.4.3. Conduct phase; 5.5. A few "elementary building blocks"; 5.5.1. General tactical framework; 5.5.2. Attacks on people; 5.5.3. Opinion manipulation and area control; 5.5.4. Military computer attack in a conventional operation; 5.6. Example scenario; 5.6.1. Tactical scenario; 5.6.2. The order of events; 5.6.3. Analysis; 5.7. Conclusion; 5.8. Bibliography
Chapter 6. Riots in Xinjiang and Chinese Information Warfare
Record Nr. UNINA-9910141487803321
Ventre Daniel  
London, : ISTE
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyberwar and information warfare [[electronic resource] /] / edited by Daniel Ventre
Cyberwar and information warfare [[electronic resource] /] / edited by Daniel Ventre
Autore Ventre Daniel
Edizione [1st edition]
Pubbl/distr/stampa London, : ISTE
Descrizione fisica 1 online resource (434 p.)
Disciplina 355.3/43
355.343
Altri autori (Persone) VentreDaniel
Collana ISTE
Soggetto topico Information warfare
Psychological warfare
Computer crimes
ISBN 1-118-60348-6
1-299-18789-7
1-118-60339-7
1-118-60351-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Cyberwar and Information Warfare; Title Page; Copyright Page; Table of Contents; Introduction; List of Acronyms; Chapter 1. Cyberwar and its Borders; 1.1. The seduction of cyberwar; 1.2. Desirable, vulnerable and frightening information; 1.3. Conflict and its dimensions; 1.4. The Helm and space; 1.5. Between knowledge and violence; 1.6. Space, distance and paths; 1.7. The permanency of war; 1.8. No war without borders; 1.9. The enemy and the sovereign; 1.10. Strengths and weaknesses; 1.11. Bibliography; Chapter 2. War of Meaning, Cyberwar and Democracies; 2.1. Introduction
2.2. Informational environment, a new operating space for strategy2.2.1. War and information: stakes for the West; 2.2.2. Strategy in the information environment; 2.2.3. Winning the battle of legitimacies; 2.3. Influence strategy: defeating and limiting armed force physical involvement; 2.3.1. Describing the aggressor; 2.3.2. Armed forces and the information environment; 2.3.3. The need for moral force; 2.4. Conclusion; 2.5. Bibliography; Chapter 3. Intelligence, the First Defense? Information Warfare and Strategic Surprise; 3.1. Information warfare, information and war
3.2. Intelligence and strategic surprise3.2.1. Strategic surprise; 3.2.2. Perception of surprise; 3.2.3. Perception of the possibility of surprise; 3.3. Strategic surprise and information warfare; 3.4. Concluding remarks: surprise in strategic studies; 3.5. Bibliography; Chapter 4. Cyberconflict: Stakes of Power; 4.1. Stakes of power; 4.1.1. Power relations; 4.1.2. Expression of sovereignty; 4.1.3. Cyberpower; 4.1.4. Measuring and locating power; 4.1.5. Limits of exercising power; 4.1.6. The Monroe doctrine; 4.1.7. Globalization; 4.1.8. Shock theories; 4.1.9. Naval and maritime power strategy
4.1.10. Air/space and cybernetic power: analogies4.1.11. Cyberconflict/cyber weapons, chemical/biological weapons: comparisons; 4.1.12. Cyberconflict/cyber weapons, Cold War, nuclear weapons: comparisons; 4.1.13. Cyberconflict and new wars; 4.2. The Stuxnet affair; 4.3. Bibliography; Chapter 5. Operational Aspects of a Cyberattack: Intelligence, Planning and Conduct; 5.1. Introduction; 5.2. Towards a broader concept of cyberwar; 5.2.1. War and cyberwar: common ground; 5.2.2. New orders in cyberwar; 5.2.3. Who are cyberwarriors?; 5.2.4. Is formalization possible?
5.3. Concept of critical infrastructure5.3.1. Generalized definition of the notion of critical infrastructure; 5.3.2. System interdependence; 5.4. Different phases of a cyberattack; 5.4.1. Intelligence phase; 5.4.2. Planning phase; 5.4.3. Conduct phase; 5.5. A few "elementary building blocks"; 5.5.1. General tactical framework; 5.5.2. Attacks on people; 5.5.3. Opinion manipulation and area control; 5.5.4. Military computer attack in a conventional operation; 5.6. Example scenario; 5.6.1. Tactical scenario; 5.6.2. The order of events; 5.6.3. Analysis; 5.7. Conclusion; 5.8. Bibliography
Chapter 6. Riots in Xinjiang and Chinese Information Warfare
Record Nr. UNINA-9910830507403321
Ventre Daniel  
London, : ISTE
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyberwar and information warfare [[electronic resource] /] / edited by Daniel Ventre
Cyberwar and information warfare [[electronic resource] /] / edited by Daniel Ventre
Autore Ventre Daniel
Edizione [1st edition]
Pubbl/distr/stampa London, : ISTE
Descrizione fisica 1 online resource (434 p.)
Disciplina 355.3/43
355.343
Altri autori (Persone) VentreDaniel
Collana ISTE
Soggetto topico Information warfare
Psychological warfare
Computer crimes
ISBN 1-118-60348-6
1-299-18789-7
1-118-60339-7
1-118-60351-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Cyberwar and Information Warfare; Title Page; Copyright Page; Table of Contents; Introduction; List of Acronyms; Chapter 1. Cyberwar and its Borders; 1.1. The seduction of cyberwar; 1.2. Desirable, vulnerable and frightening information; 1.3. Conflict and its dimensions; 1.4. The Helm and space; 1.5. Between knowledge and violence; 1.6. Space, distance and paths; 1.7. The permanency of war; 1.8. No war without borders; 1.9. The enemy and the sovereign; 1.10. Strengths and weaknesses; 1.11. Bibliography; Chapter 2. War of Meaning, Cyberwar and Democracies; 2.1. Introduction
2.2. Informational environment, a new operating space for strategy2.2.1. War and information: stakes for the West; 2.2.2. Strategy in the information environment; 2.2.3. Winning the battle of legitimacies; 2.3. Influence strategy: defeating and limiting armed force physical involvement; 2.3.1. Describing the aggressor; 2.3.2. Armed forces and the information environment; 2.3.3. The need for moral force; 2.4. Conclusion; 2.5. Bibliography; Chapter 3. Intelligence, the First Defense? Information Warfare and Strategic Surprise; 3.1. Information warfare, information and war
3.2. Intelligence and strategic surprise3.2.1. Strategic surprise; 3.2.2. Perception of surprise; 3.2.3. Perception of the possibility of surprise; 3.3. Strategic surprise and information warfare; 3.4. Concluding remarks: surprise in strategic studies; 3.5. Bibliography; Chapter 4. Cyberconflict: Stakes of Power; 4.1. Stakes of power; 4.1.1. Power relations; 4.1.2. Expression of sovereignty; 4.1.3. Cyberpower; 4.1.4. Measuring and locating power; 4.1.5. Limits of exercising power; 4.1.6. The Monroe doctrine; 4.1.7. Globalization; 4.1.8. Shock theories; 4.1.9. Naval and maritime power strategy
4.1.10. Air/space and cybernetic power: analogies4.1.11. Cyberconflict/cyber weapons, chemical/biological weapons: comparisons; 4.1.12. Cyberconflict/cyber weapons, Cold War, nuclear weapons: comparisons; 4.1.13. Cyberconflict and new wars; 4.2. The Stuxnet affair; 4.3. Bibliography; Chapter 5. Operational Aspects of a Cyberattack: Intelligence, Planning and Conduct; 5.1. Introduction; 5.2. Towards a broader concept of cyberwar; 5.2.1. War and cyberwar: common ground; 5.2.2. New orders in cyberwar; 5.2.3. Who are cyberwarriors?; 5.2.4. Is formalization possible?
5.3. Concept of critical infrastructure5.3.1. Generalized definition of the notion of critical infrastructure; 5.3.2. System interdependence; 5.4. Different phases of a cyberattack; 5.4.1. Intelligence phase; 5.4.2. Planning phase; 5.4.3. Conduct phase; 5.5. A few "elementary building blocks"; 5.5.1. General tactical framework; 5.5.2. Attacks on people; 5.5.3. Opinion manipulation and area control; 5.5.4. Military computer attack in a conventional operation; 5.6. Example scenario; 5.6.1. Tactical scenario; 5.6.2. The order of events; 5.6.3. Analysis; 5.7. Conclusion; 5.8. Bibliography
Chapter 6. Riots in Xinjiang and Chinese Information Warfare
Record Nr. UNINA-9910841006703321
Ventre Daniel  
London, : ISTE
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui