Cyberwar and information warfare /

Integrating empirical, conceptual, and theoretical approaches, this book presents the thinking of researchers and experts in the fields of cybersecurity, cyberdefense, and information warfare. The aim of this book is to analyze the processes of information warfare and cyberwarfare through the histor...

Full description

Saved in:
Bibliographic Details
Other Authors: Ventre, Daniel.
Format: eBook
Language:English
Published: London : Hoboken, NJ : ISTE ; John Wiley, 2011.
Series:ISTE.
Subjects:
Online Access:CONNECT
CONNECT
LEADER 05803nam a2200625 a 4500
001 in00006110818
006 m o d
007 cr cnu---unuuu
008 130218s2011 enka ob 001 0 eng d
005 20220506183855.2
035 |a (NhCcYBP)5d50d7e5b45a4165915fe73ab9482d3f9781118603482 
035 |a 1wileyeba9781118603482 
040 |a NhCcYBP  |b eng  |c NhCcYBP 
020 |a 9781118603482 
020 |a 9781118603390  |q (electronic bk.) 
020 |a 1118603397  |q (electronic bk.) 
020 |a 1118603486  |q (electronic bk.) 
020 |a 9781118603512 
020 |a 1118603516 
020 |z 9781848213043 
020 |z 1848213042 
037 |a CL0500000416  |b Safari Books Online 
050 4 |a U163  |b .C937 2011eb 
082 0 4 |a 355.3/43  |2 23 
245 0 0 |a Cyberwar and information warfare /  |c edited by Daniel Ventre. 
260 |a London :  |b ISTE ;  |a Hoboken, NJ :  |b John Wiley,  |c 2011. 
300 |a 1 online resource (xix, 412 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a ISTE 
504 |a Includes bibliographical references and index. 
588 0 |a Print version record. 
505 0 |a Cover; Cyberwar and Information Warfare; Title Page; Copyright Page; Table of Contents; Introduction; List of Acronyms; Chapter 1. Cyberwar and its Borders; 1.1. The seduction of cyberwar; 1.2. Desirable, vulnerable and frightening information; 1.3. Conflict and its dimensions; 1.4. The Helm and space; 1.5. Between knowledge and violence; 1.6. Space, distance and paths; 1.7. The permanency of war; 1.8. No war without borders; 1.9. The enemy and the sovereign; 1.10. Strengths and weaknesses; 1.11. Bibliography; Chapter 2. War of Meaning, Cyberwar and Democracies; 2.1. Introduction. 
505 8 |a 2.2. Informational environment, a new operating space for strategy2.2.1. War and information: stakes for the West; 2.2.2. Strategy in the information environment; 2.2.3. Winning the battle of legitimacies; 2.3. Influence strategy: defeating and limiting armed force physical involvement; 2.3.1. Describing the aggressor; 2.3.2. Armed forces and the information environment; 2.3.3. The need for moral force; 2.4. Conclusion; 2.5. Bibliography; Chapter 3. Intelligence, the First Defense? Information Warfare and Strategic Surprise; 3.1. Information warfare, information and war. 
505 8 |a 3.2. Intelligence and strategic surprise3.2.1. Strategic surprise; 3.2.2. Perception of surprise; 3.2.3. Perception of the possibility of surprise; 3.3. Strategic surprise and information warfare; 3.4. Concluding remarks: surprise in strategic studies; 3.5. Bibliography; Chapter 4. Cyberconflict: Stakes of Power; 4.1. Stakes of power; 4.1.1. Power relations; 4.1.2. Expression of sovereignty; 4.1.3. Cyberpower; 4.1.4. Measuring and locating power; 4.1.5. Limits of exercising power; 4.1.6. The Monroe doctrine; 4.1.7. Globalization; 4.1.8. Shock theories; 4.1.9. Naval and maritime power strategy. 
505 8 |a 4.1.10. Air/space and cybernetic power: analogies4.1.11. Cyberconflict/cyber weapons, chemical/biological weapons: comparisons; 4.1.12. Cyberconflict/cyber weapons, Cold War, nuclear weapons: comparisons; 4.1.13. Cyberconflict and new wars; 4.2. The Stuxnet affair; 4.3. Bibliography; Chapter 5. Operational Aspects of a Cyberattack: Intelligence, Planning and Conduct; 5.1. Introduction; 5.2. Towards a broader concept of cyberwar; 5.2.1. War and cyberwar: common ground; 5.2.2. New orders in cyberwar; 5.2.3. Who are cyberwarriors?; 5.2.4. Is formalization possible? 
505 8 |a 5.3. Concept of critical infrastructure5.3.1. Generalized definition of the notion of critical infrastructure; 5.3.2. System interdependence; 5.4. Different phases of a cyberattack; 5.4.1. Intelligence phase; 5.4.2. Planning phase; 5.4.3. Conduct phase; 5.5. A few elementary building blocks; 5.5.1. General tactical framework; 5.5.2. Attacks on people; 5.5.3. Opinion manipulation and area control; 5.5.4. Military computer attack in a conventional operation; 5.6. Example scenario; 5.6.1. Tactical scenario; 5.6.2. The order of events; 5.6.3. Analysis; 5.7. Conclusion; 5.8. Bibliography. 
520 |a Integrating empirical, conceptual, and theoretical approaches, this book presents the thinking of researchers and experts in the fields of cybersecurity, cyberdefense, and information warfare. The aim of this book is to analyze the processes of information warfare and cyberwarfare through the historical, operational and strategic perspectives of cyberattacks. Cyberwar and Information Warfare is of extreme use to experts in security studies and intelligence studies, defense universities, ministries of defense and security, and anyone studying political sciences, international relations, g. 
590 |a Wiley EBA 
650 0 |a Information warfare. 
650 0 |a Psychological warfare. 
650 0 |a Computer crimes. 
700 1 |a Ventre, Daniel. 
730 0 |a WILEYEBA 
776 0 8 |i Print version:  |t Cyberwar and information warfare.  |d London : ISTE ; Hoboken, NJ : John Wiley, 2011  |z 9781848213043  |w (DLC) 2011024020 
830 0 |a ISTE. 
856 4 0 |u https://ezproxy.mtsu.edu/login?url=https://onlinelibrary.wiley.com/book/10.1002/9781118603482  |z CONNECT  |3 Wiley  |t 0 
949 |a ho0 
975 |p Wiley UBCM All Titles thru 2021 
976 |a 6005108 
998 |a wi  |d z 
999 f f |s 4993983b-e4f2-4405-8bef-ad050be1369d  |i 4993983b-e4f2-4405-8bef-ad050be1369d  |t 0 
952 f f |a Middle Tennessee State University  |b Main  |c James E. Walker Library  |d Electronic Resources  |t 0  |e U163 .C937 2011eb  |h Library of Congress classification 
856 4 0 |3 Wiley  |t 0  |u https://ezproxy.mtsu.edu/login?url=https://onlinelibrary.wiley.com/book/10.1002/9781118603482  |z CONNECT