Cyberwar and information warfare / (Record no. 20142)

000 -LEADER
fixed length control field 06107cam a2200733Ka 4500
001 - CONTROL NUMBER
control field ocn827947140
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20171031163758.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu---unuuu
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 130218s2011 enka ob 001 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency N$T
Language of cataloging eng
Description conventions pn
Transcribing agency N$T
Modifying agency YDXCP
-- DG1
-- IDEBK
-- E7B
-- OCLCF
-- UMI
-- UKDOC
-- DEBBG
-- EBLCP
-- MHW
-- OCLCQ
-- COO
-- OCLCQ
019 ## -
-- 827207661
-- 878048968
-- 878049080
-- 878049294
-- 878059852
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781118603390
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1118603397
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781118603482
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1118603486
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781118603512
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1118603516
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Cancelled/invalid ISBN 9781848213043
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Cancelled/invalid ISBN 1848213042
029 1# - (OCLC)
OCLC library identifier CHNEW
System control number 000599580
029 1# - (OCLC)
OCLC library identifier DEBBG
System control number BV041907976
029 1# - (OCLC)
OCLC library identifier DEBBG
System control number BV042032227
029 1# - (OCLC)
OCLC library identifier DEBBG
System control number BV043395432
029 1# - (OCLC)
OCLC library identifier DEBSZ
System control number 414176944
029 1# - (OCLC)
OCLC library identifier NZ1
System control number 15915663
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)827947140
Canceled/invalid control number (OCoLC)827207661
-- (OCoLC)878048968
-- (OCoLC)878049080
-- (OCoLC)878049294
-- (OCoLC)878059852
037 ## - SOURCE OF ACQUISITION
Stock number CL0500000416
Source of stock number/acquisition Safari Books Online
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number U163
Item number .C937 2011eb
072 #7 - SUBJECT CATEGORY CODE
Subject category code HIS
Subject category code subdivision 027010
Source bisacsh
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 355.3/43
Edition number 23
049 ## - LOCAL HOLDINGS (OCLC)
Holding library MAIN
245 00 - TITLE STATEMENT
Title Cyberwar and information warfare /
Statement of responsibility, etc edited by Daniel Ventre.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc London :
Name of publisher, distributor, etc ISTE ;
Place of publication, distribution, etc Hoboken, NJ :
Name of publisher, distributor, etc John Wiley,
Date of publication, distribution, etc 2011.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (xix, 412 pages) :
Other physical details illustrations.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
490 1# - SERIES STATEMENT
Series statement ISTE
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
588 0# -
-- Print version record.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Cover; Cyberwar and Information Warfare; Title Page; Copyright Page; Table of Contents; Introduction; List of Acronyms; Chapter 1. Cyberwar and its Borders; 1.1. The seduction of cyberwar; 1.2. Desirable, vulnerable and frightening information; 1.3. Conflict and its dimensions; 1.4. The Helm and space; 1.5. Between knowledge and violence; 1.6. Space, distance and paths; 1.7. The permanency of war; 1.8. No war without borders; 1.9. The enemy and the sovereign; 1.10. Strengths and weaknesses; 1.11. Bibliography; Chapter 2. War of Meaning, Cyberwar and Democracies; 2.1. Introduction.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 2.2. Informational environment, a new operating space for strategy2.2.1. War and information: stakes for the West; 2.2.2. Strategy in the information environment; 2.2.3. Winning the battle of legitimacies; 2.3. Influence strategy: defeating and limiting armed force physical involvement; 2.3.1. Describing the aggressor; 2.3.2. Armed forces and the information environment; 2.3.3. The need for moral force; 2.4. Conclusion; 2.5. Bibliography; Chapter 3. Intelligence, the First Defense? Information Warfare and Strategic Surprise; 3.1. Information warfare, information and war.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 3.2. Intelligence and strategic surprise3.2.1. Strategic surprise; 3.2.2. Perception of surprise; 3.2.3. Perception of the possibility of surprise; 3.3. Strategic surprise and information warfare; 3.4. Concluding remarks: surprise in strategic studies; 3.5. Bibliography; Chapter 4. Cyberconflict: Stakes of Power; 4.1. Stakes of power; 4.1.1. Power relations; 4.1.2. Expression of sovereignty; 4.1.3. Cyberpower; 4.1.4. Measuring and locating power; 4.1.5. Limits of exercising power; 4.1.6. The Monroe doctrine; 4.1.7. Globalization; 4.1.8. Shock theories; 4.1.9. Naval and maritime power strategy.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 4.1.10. Air/space and cybernetic power: analogies4.1.11. Cyberconflict/cyber weapons, chemical/biological weapons: comparisons; 4.1.12. Cyberconflict/cyber weapons, Cold War, nuclear weapons: comparisons; 4.1.13. Cyberconflict and new wars; 4.2. The Stuxnet affair; 4.3. Bibliography; Chapter 5. Operational Aspects of a Cyberattack: Intelligence, Planning and Conduct; 5.1. Introduction; 5.2. Towards a broader concept of cyberwar; 5.2.1. War and cyberwar: common ground; 5.2.2. New orders in cyberwar; 5.2.3. Who are cyberwarriors?; 5.2.4. Is formalization possible?
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 5.3. Concept of critical infrastructure5.3.1. Generalized definition of the notion of critical infrastructure; 5.3.2. System interdependence; 5.4. Different phases of a cyberattack; 5.4.1. Intelligence phase; 5.4.2. Planning phase; 5.4.3. Conduct phase; 5.5. A few "elementary building blocks"; 5.5.1. General tactical framework; 5.5.2. Attacks on people; 5.5.3. Opinion manipulation and area control; 5.5.4. Military computer attack in a conventional operation; 5.6. Example scenario; 5.6.1. Tactical scenario; 5.6.2. The order of events; 5.6.3. Analysis; 5.7. Conclusion; 5.8. Bibliography.
520 ## - SUMMARY, ETC.
Summary, etc Integrating empirical, conceptual, and theoretical approaches, this book presents the thinking of researchers and experts in the fields of cybersecurity, cyberdefense, and information warfare. The aim of this book is to analyze the processes of information warfare and cyberwarfare through the historical, operational and strategic perspectives of cyberattacks. Cyberwar and Information Warfare is of extreme use to experts in security studies and intelligence studies, defense universities, ministries of defense and security, and anyone studying political sciences, international relations, g.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information warfare.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Psychological warfare.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer crimes.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer crimes.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information warfare.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Psychological warfare.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element HISTORY
General subdivision Military
-- Biological & Chemical Warfare.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer crimes.
Source of heading or term fast
-- (OCoLC)fst00872063
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information warfare.
Source of heading or term fast
-- (OCoLC)fst00973186
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Psychological warfare.
Source of heading or term fast
-- (OCoLC)fst01081405
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Ventre, Daniel.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Print version:
Title Cyberwar and information warfare.
Place, publisher, and date of publication London : ISTE ; Hoboken, NJ : John Wiley, 2011
International Standard Book Number 9781848213043
Record control number (DLC) 2011024020
-- (OCoLC)729721299
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title ISTE.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://dx.doi.org/10.1002/9781118603482">http://dx.doi.org/10.1002/9781118603482</a>
Public note Wiley Online Library
994 ## -
-- 92
-- DG1

No items available.


 

Last Updated November 15 2020
Copyright © IUB Library
Independent University, Bangladesh.
Library Home | About Library | Services | FAQS | Contact