000 06156cam a2200757Ka 4500
001 ocn827947140
003 OCoLC
005 20230823095441.0
006 m o d
007 cr cnu---unuuu
008 130218s2011 enka ob 001 0 eng d
040 _aN$T
_beng
_epn
_cN$T
_dYDXCP
_dDG1
_dIDEBK
_dE7B
_dOCLCF
_dUMI
_dUKDOC
_dDEBBG
_dEBLCP
_dMHW
_dOCLCQ
_dCOO
_dOCLCQ
019 _a827207661
_a878048968
_a878049080
_a878049294
_a878059852
020 _a9781118603390
_q(electronic bk.)
020 _a1118603397
_q(electronic bk.)
020 _a9781118603482
_q(electronic bk.)
020 _a1118603486
_q(electronic bk.)
020 _a9781118603512
020 _a1118603516
020 _z9781848213043
020 _z1848213042
029 1 _aCHNEW
_b000599580
029 1 _aDEBBG
_bBV041907976
029 1 _aDEBBG
_bBV042032227
029 1 _aDEBBG
_bBV043395432
029 1 _aDEBSZ
_b414176944
029 1 _aNZ1
_b15915663
035 _a(OCoLC)827947140
_z(OCoLC)827207661
_z(OCoLC)878048968
_z(OCoLC)878049080
_z(OCoLC)878049294
_z(OCoLC)878059852
037 _aCL0500000416
_bSafari Books Online
050 4 _aU163
_b.C937 2011eb
072 7 _aHIS
_x027010
_2bisacsh
082 0 4 _a355.3/43
_223
049 _aMAIN
245 0 0 _aCyberwar and information warfare /
_cedited by Daniel Ventre.
260 _aLondon :
_bISTE ;
_aHoboken, NJ :
_bJohn Wiley,
_c2011.
300 _a1 online resource (xix, 412 pages) :
_billustrations.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
490 1 _aISTE
504 _aIncludes bibliographical references and index.
588 0 _aPrint version record.
505 0 _aCover; Cyberwar and Information Warfare; Title Page; Copyright Page; Table of Contents; Introduction; List of Acronyms; Chapter 1. Cyberwar and its Borders; 1.1. The seduction of cyberwar; 1.2. Desirable, vulnerable and frightening information; 1.3. Conflict and its dimensions; 1.4. The Helm and space; 1.5. Between knowledge and violence; 1.6. Space, distance and paths; 1.7. The permanency of war; 1.8. No war without borders; 1.9. The enemy and the sovereign; 1.10. Strengths and weaknesses; 1.11. Bibliography; Chapter 2. War of Meaning, Cyberwar and Democracies; 2.1. Introduction.
505 8 _a2.2. Informational environment, a new operating space for strategy2.2.1. War and information: stakes for the West; 2.2.2. Strategy in the information environment; 2.2.3. Winning the battle of legitimacies; 2.3. Influence strategy: defeating and limiting armed force physical involvement; 2.3.1. Describing the aggressor; 2.3.2. Armed forces and the information environment; 2.3.3. The need for moral force; 2.4. Conclusion; 2.5. Bibliography; Chapter 3. Intelligence, the First Defense? Information Warfare and Strategic Surprise; 3.1. Information warfare, information and war.
505 8 _a3.2. Intelligence and strategic surprise3.2.1. Strategic surprise; 3.2.2. Perception of surprise; 3.2.3. Perception of the possibility of surprise; 3.3. Strategic surprise and information warfare; 3.4. Concluding remarks: surprise in strategic studies; 3.5. Bibliography; Chapter 4. Cyberconflict: Stakes of Power; 4.1. Stakes of power; 4.1.1. Power relations; 4.1.2. Expression of sovereignty; 4.1.3. Cyberpower; 4.1.4. Measuring and locating power; 4.1.5. Limits of exercising power; 4.1.6. The Monroe doctrine; 4.1.7. Globalization; 4.1.8. Shock theories; 4.1.9. Naval and maritime power strategy.
505 8 _a4.1.10. Air/space and cybernetic power: analogies4.1.11. Cyberconflict/cyber weapons, chemical/biological weapons: comparisons; 4.1.12. Cyberconflict/cyber weapons, Cold War, nuclear weapons: comparisons; 4.1.13. Cyberconflict and new wars; 4.2. The Stuxnet affair; 4.3. Bibliography; Chapter 5. Operational Aspects of a Cyberattack: Intelligence, Planning and Conduct; 5.1. Introduction; 5.2. Towards a broader concept of cyberwar; 5.2.1. War and cyberwar: common ground; 5.2.2. New orders in cyberwar; 5.2.3. Who are cyberwarriors?; 5.2.4. Is formalization possible?
505 8 _a5.3. Concept of critical infrastructure5.3.1. Generalized definition of the notion of critical infrastructure; 5.3.2. System interdependence; 5.4. Different phases of a cyberattack; 5.4.1. Intelligence phase; 5.4.2. Planning phase; 5.4.3. Conduct phase; 5.5. A few "elementary building blocks"; 5.5.1. General tactical framework; 5.5.2. Attacks on people; 5.5.3. Opinion manipulation and area control; 5.5.4. Military computer attack in a conventional operation; 5.6. Example scenario; 5.6.1. Tactical scenario; 5.6.2. The order of events; 5.6.3. Analysis; 5.7. Conclusion; 5.8. Bibliography.
520 _aIntegrating empirical, conceptual, and theoretical approaches, this book presents the thinking of researchers and experts in the fields of cybersecurity, cyberdefense, and information warfare. The aim of this book is to analyze the processes of information warfare and cyberwarfare through the historical, operational and strategic perspectives of cyberattacks. Cyberwar and Information Warfare is of extreme use to experts in security studies and intelligence studies, defense universities, ministries of defense and security, and anyone studying political sciences, international relations, g.
650 0 _aInformation warfare.
650 0 _aPsychological warfare.
650 0 _aComputer crimes.
650 4 _aComputer crimes.
650 4 _aInformation warfare.
650 4 _aPsychological warfare.
650 7 _aHISTORY
_xMilitary
_xBiological & Chemical Warfare.
_2bisacsh
650 7 _aComputer crimes.
_2fast
_0(OCoLC)fst00872063
650 7 _aInformation warfare.
_2fast
_0(OCoLC)fst00973186
650 7 _aPsychological warfare.
_2fast
_0(OCoLC)fst01081405
655 4 _aElectronic books.
700 1 _aVentre, Daniel.
776 0 8 _iPrint version:
_tCyberwar and information warfare.
_dLondon : ISTE ; Hoboken, NJ : John Wiley, 2011
_z9781848213043
_w(DLC) 2011024020
_w(OCoLC)729721299
830 0 _aISTE.
856 4 0 _uhttp://dx.doi.org/10.1002/9781118603482
_zWiley Online Library
994 _a92
_bDG1
999 _c20142
_d20101
526 _bgsg