skip to content
Information Warfare. Preview this item
ClosePreview this item
Checking...

Information Warfare.

Author: Daniel Ventre
Publisher: London : Wiley, 2012.
Series: ISTE.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
This book introduces policy, government, and security professionals to the concept of "information warfare," covering its evolution over the last decade and its developments among such economic and political giants as China, Russia, Japan, India, and Singapore. The text describes various conceptions of information warfare, along with how they function in military, diplomatic, political, and economic contexts. Recent  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Ventre, Daniel.
Information Warfare.
London : Wiley, ©2012
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Daniel Ventre
ISBN: 9781118381540 1118381548
OCLC Number: 823722243
Language Note: Translated from the French.
Notes: 2.2.3.4. What would Chinese targets be?
Description: 1 online resource (566 pages).
Contents: Cover; Title Page; Copyright; Abbreviations; Introduction; Chapter 1: The United States; 1.1. Information warfare in the 1990s; 1.1.1. Points of view from security experts; 1.1.1.1. Official military documents; 1.1.2. US Air Force doctrine: AFDD 2-5 (1998); 1.1.2.1. Superiority of information; 1.1.2.2. Information operations; 1.1.2.3. Information warfare; 1.1.3. The doctrine of the Joint Chiefs of Staff committee: JP 3-13 (1998); 1.1.3.1. Superiority of information; 1.1.3.2. Information operations; 1.1.3.3. Information warfare; 1.1.4. Components of information warfare. 1.1.4.1. Psychological operations1.1.4.2. Electronic warfare; 1.1.4.3. Military deception; 1.1.4.4. Operations security; 1.1.4.5. Information assurance; 1.1.4.6. Computer network attacks; 1.2. Information warfare in the 2000s; 1.2.1. Dictionary of the Department of Defense; 1.2.2. US Air Force: AFDD 2-5 (2005) and AFPD 10-7 (2006); 1.2.3. The doctrine of the Joint Chiefs of Staff committee: JP 3-13 (2006); 1.3. Other important concepts and reflections; 1.3.1. Cyberspace and superiority of information; 1.3.2. The "value" of information; 1.3.3. Information system. 1.3.4. Command and control warfare: C2W1.3.5. Effect-Based Operations (EBOs); 1.3.6. Information-in-warfare; 1.3.7. The OODA loop; 1.3.8. Fourth generation warfare; 1.3.9. Noosphere; 1.3.10. RMA; 1.3.11. C4ISR; 1.3.12. Network Centric Warfare (NCW); 1.3.13. ISR: intelligence, surveillance, reconnaissance; 1.3.14. Cyberwar; 1.3.15. Netwar; 1.3.16. Spin doctoring; 1.3.17. Intelligence; 1.3.18. Information operations; 1.4. Loss of information control; 1.5. American concerns; Chapter 2: China; 2.1. The concept of "information warfare": a genesis; 2.1.1. General Wang Pufeng: one of the pioneers. 2.1.2. Colonel Wang Baocun2.1.3. Colonels Qiao Liang and Wang Xiangsui: out of bounds war; 2.1.3.1. A series of observations on the modern world; 2.1.3.2. Governments no longer battle each other the same way; 2.1.3.3. Reflection on the importance of technique; 2.1.3.4. Dependence on technique; 2.1.3.5. On information warfare; 2.1.4. General Dai Qingmin and Wang Baocun; 2.1.5. General Niu Li, Colonel Li Jiangzhou and Major Xu Dehui; 2.1.6. 2004 white book on national defense; 2.1.7. Sun Tzu and information warfare; 2.1.8. How to implement the theories. 2.1.8.1. Army training centers and simulation exercises2.1.8.2. Forming specialists in defense; 2.1.8.3. Should a specialized army corps be created?; 2.1.8.4. Real attacks?; 2.2. The American perspective on Chinese information warfare, modernization and informatization of the PLA; 2.2.1. Interpretation problems; 2.2.2. The impenetrability of China; 2.2.3. Information warfare; 2.2.3.1. The Chinese version may only be a copy of the American version; 2.2.3.2. What would the objectives of Chinese information warfare be?; 2.2.3.3. Capacity reinforcement of information warfare.
Series Title: ISTE.
More information:

Abstract:

This book introduces policy, government, and security professionals to the concept of "information warfare," covering its evolution over the last decade and its developments among such economic and  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/823722243> # Information Warfare.
    a schema:MediaObject, schema:Book, schema:CreativeWork ;
    bgn:translationOfWork <http://www.worldcat.org/title/-/oclc/823722243#CreativeWork/unidentifiedOriginalWork> ;
    library:oclcnum "823722243" ;
    library:placeOfPublication <http://dbpedia.org/resource/London> ; # London
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/enk> ;
    schema:about <http://id.worldcat.org/fast/887958> ; # Data protection
    schema:about <http://id.worldcat.org/fast/872493> ; # Computer security--Management
    schema:about <http://id.loc.gov/authorities/subjects/sh2009121243> ; # Computer security--Management
    schema:about <http://id.worldcat.org/fast/1153869> ; # Trade secrets
    schema:about <http://id.loc.gov/authorities/subjects/sh2009127217> ; # Information technology--Security measures
    schema:about <http://dewey.info/class/004/> ;
    schema:about <http://id.worldcat.org/fast/842723> ; # Business intelligence
    schema:about <http://id.worldcat.org/fast/973129> ; # Information technology--Security measures
    schema:bookFormat schema:EBook ;
    schema:creator <http://viaf.org/viaf/19857479> ; # Daniel Ventre
    schema:datePublished "2012" ;
    schema:description "This book introduces policy, government, and security professionals to the concept of "information warfare," covering its evolution over the last decade and its developments among such economic and political giants as China, Russia, Japan, India, and Singapore. The text describes various conceptions of information warfare, along with how they function in military, diplomatic, political, and economic contexts. Recent notable cyber attacks are analyzed, the challenges faced by countries who fail to secure their cyberspace (Japan, the US, etc.) are enumerated, and ways to distinguish between cybe."@en ;
    schema:description "Cover; Title Page; Copyright; Abbreviations; Introduction; Chapter 1: The United States; 1.1. Information warfare in the 1990s; 1.1.1. Points of view from security experts; 1.1.1.1. Official military documents; 1.1.2. US Air Force doctrine: AFDD 2-5 (1998); 1.1.2.1. Superiority of information; 1.1.2.2. Information operations; 1.1.2.3. Information warfare; 1.1.3. The doctrine of the Joint Chiefs of Staff committee: JP 3-13 (1998); 1.1.3.1. Superiority of information; 1.1.3.2. Information operations; 1.1.3.3. Information warfare; 1.1.4. Components of information warfare."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/146641179> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/146641179#Series/iste> ; # ISTE.
    schema:isSimilarTo <http://worldcat.org/entity/work/data/146641179#CreativeWork/information_warfare> ;
    schema:name "Information Warfare."@en ;
    schema:productID "823722243" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/823722243#PublicationEvent/london_wiley_2012> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/146641179#Agent/wiley> ; # Wiley
    schema:url <http://public.ebookcentral.proquest.com/choice/publicfullrecord.aspx?p=1106528> ;
    schema:url <http://ebookcentral.proquest.com/lib/columbia/detail.action?docID=1106528> ;
    schema:url <https://ebookcentral.proquest.com/lib/ucm/detail.action?docID=1106528> ;
    schema:url <http://public.eblib.com/choice/publicfullrecord.aspx?p=1106528> ;
    schema:url <https://ebookcentral.proquest.com/lib/ben/detail.action?docID=1106528> ;
    schema:workExample <http://worldcat.org/isbn/9781118381540> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/823722243> ;
    .


Related Entities

<http://dbpedia.org/resource/London> # London
    a schema:Place ;
    schema:name "London" ;
    .

<http://id.loc.gov/authorities/subjects/sh2009121243> # Computer security--Management
    a schema:Intangible ;
    schema:name "Computer security--Management"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh2009127217> # Information technology--Security measures
    a schema:Intangible ;
    schema:name "Information technology--Security measures"@en ;
    .

<http://id.worldcat.org/fast/1153869> # Trade secrets
    a schema:Intangible ;
    schema:name "Trade secrets"@en ;
    .

<http://id.worldcat.org/fast/842723> # Business intelligence
    a schema:Intangible ;
    schema:name "Business intelligence"@en ;
    .

<http://id.worldcat.org/fast/872493> # Computer security--Management
    a schema:Intangible ;
    schema:name "Computer security--Management"@en ;
    .

<http://id.worldcat.org/fast/887958> # Data protection
    a schema:Intangible ;
    schema:name "Data protection"@en ;
    .

<http://id.worldcat.org/fast/973129> # Information technology--Security measures
    a schema:Intangible ;
    schema:name "Information technology--Security measures"@en ;
    .

<http://viaf.org/viaf/19857479> # Daniel Ventre
    a schema:Person ;
    schema:familyName "Ventre" ;
    schema:givenName "Daniel" ;
    schema:name "Daniel Ventre" ;
    .

<http://worldcat.org/isbn/9781118381540>
    a schema:ProductModel ;
    schema:isbn "1118381548" ;
    schema:isbn "9781118381540" ;
    .

<https://ebookcentral.proquest.com/lib/ben/detail.action?docID=1106528>
    rdfs:comment "(access limited to Benedictine University patrons)" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.