Cyberwar and information warfare

Integrating empirical, conceptual, and theoretical approaches, this book presents the thinking of researchers and experts in the fields of cybersecurity, cyberdefense, and information warfare. The aim of this book is to analyze the processes of information warfare and cyberwarfare through the histor...

Full description

Bibliographic Details
Main Author: Ventre, Daniel
Format: eBook
Language:English
Published: London ISTE 2011
Series:ISTE
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 05221nmm a2200553 u 4500
001 EB001916157
003 EBX01000000000000001079059
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 1118603397 
020 |a 1118603486 
020 |a 9781118603482 
020 |a 9781118603512 
020 |a 9781118603390 
050 4 |a U163 
100 1 |a Ventre, Daniel 
245 0 0 |a Cyberwar and information warfare  |c edited by Daniel Ventre 
260 |a London  |b ISTE  |c 2011 
300 |a xix, 412 pages  |b illustrations 
505 0 |a Includes bibliographical references and index 
505 0 |a 3.2. Intelligence and strategic surprise3.2.1. Strategic surprise; 3.2.2. Perception of surprise; 3.2.3. Perception of the possibility of surprise; 3.3. Strategic surprise and information warfare; 3.4. Concluding remarks: surprise in strategic studies; 3.5. Bibliography; Chapter 4. Cyberconflict: Stakes of Power; 4.1. Stakes of power; 4.1.1. Power relations; 4.1.2. Expression of sovereignty; 4.1.3. Cyberpower; 4.1.4. Measuring and locating power; 4.1.5. Limits of exercising power; 4.1.6. The Monroe doctrine; 4.1.7. Globalization; 4.1.8. Shock theories; 4.1.9. Naval and maritime power strategy 
505 0 |a 5.3. Concept of critical infrastructure5.3.1. Generalized definition of the notion of critical infrastructure; 5.3.2. System interdependence; 5.4. Different phases of a cyberattack; 5.4.1. Intelligence phase; 5.4.2. Planning phase; 5.4.3. Conduct phase; 5.5. A few "elementary building blocks"; 5.5.1. General tactical framework; 5.5.2. Attacks on people; 5.5.3. Opinion manipulation and area control; 5.5.4. Military computer attack in a conventional operation; 5.6. Example scenario; 5.6.1. Tactical scenario; 5.6.2. The order of events; 5.6.3. Analysis; 5.7. Conclusion; 5.8. Bibliography 
505 0 |a 2.2. Informational environment, a new operating space for strategy2.2.1. War and information: stakes for the West; 2.2.2. Strategy in the information environment; 2.2.3. Winning the battle of legitimacies; 2.3. Influence strategy: defeating and limiting armed force physical involvement; 2.3.1. Describing the aggressor; 2.3.2. Armed forces and the information environment; 2.3.3. The need for moral force; 2.4. Conclusion; 2.5. Bibliography; Chapter 3. Intelligence, the First Defense? Information Warfare and Strategic Surprise; 3.1. Information warfare, information and war 
505 0 |a Cover; Cyberwar and Information Warfare; Title Page; Copyright Page; Table of Contents; Introduction; List of Acronyms; Chapter 1. Cyberwar and its Borders; 1.1. The seduction of cyberwar; 1.2. Desirable, vulnerable and frightening information; 1.3. Conflict and its dimensions; 1.4. The Helm and space; 1.5. Between knowledge and violence; 1.6. Space, distance and paths; 1.7. The permanency of war; 1.8. No war without borders; 1.9. The enemy and the sovereign; 1.10. Strengths and weaknesses; 1.11. Bibliography; Chapter 2. War of Meaning, Cyberwar and Democracies; 2.1. Introduction 
505 0 |a 4.1.10. Air/space and cybernetic power: analogies4.1.11. Cyberconflict/cyber weapons, chemical/biological weapons: comparisons; 4.1.12. Cyberconflict/cyber weapons, Cold War, nuclear weapons: comparisons; 4.1.13. Cyberconflict and new wars; 4.2. The Stuxnet affair; 4.3. Bibliography; Chapter 5. Operational Aspects of a Cyberattack: Intelligence, Planning and Conduct; 5.1. Introduction; 5.2. Towards a broader concept of cyberwar; 5.2.1. War and cyberwar: common ground; 5.2.2. New orders in cyberwar; 5.2.3. Who are cyberwarriors?; 5.2.4. Is formalization possible? 
653 |a Criminalité informatique 
653 |a HISTORY / Military / Biological & Chemical Warfare / bisacsh 
653 |a Information warfare / http://id.loc.gov/authorities/subjects/sh95005481 
653 |a Psychological warfare / http://id.loc.gov/authorities/subjects/sh85108451 
653 |a Computer crimes / fast 
653 |a Computer crimes / http://id.loc.gov/authorities/subjects/sh85029492 
653 |a Guerre psychologique 
653 |a Information warfare / fast 
653 |a Guerre de l'information 
653 |a Psychological warfare / fast 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
490 0 |a ISTE 
776 |z 9781848213043 
776 |z 1118603486 
776 |z 9781118603482 
776 |z 1848213042 
776 |z 1118603397 
776 |z 9781118603390 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781118603512/?ar  |x Verlag  |3 Volltext 
082 0 |a 355.3/43 
082 0 |a 364.1 
520 |a Integrating empirical, conceptual, and theoretical approaches, this book presents the thinking of researchers and experts in the fields of cybersecurity, cyberdefense, and information warfare. The aim of this book is to analyze the processes of information warfare and cyberwarfare through the historical, operational and strategic perspectives of cyberattacks. Cyberwar and Information Warfare is of extreme use to experts in security studies and intelligence studies, defense universities, ministries of defense and security, and anyone studying political sciences, international relations, g