Details

Cyberwar and Information Warfare


Cyberwar and Information Warfare


1. Aufl.

von: Daniel Ventre

144,99 €

Verlag: Wiley
Format: EPUB
Veröffentl.: 27.12.2012
ISBN/EAN: 9781118603512
Sprache: englisch
Anzahl Seiten: 448

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

Integrating empirical, conceptual, and theoretical approaches, this book presents the thinking of researchers and experts in the fields of cybersecurity, cyberdefense, and information warfare.<br /> The aim of this book is to analyze the processes of information warfare and cyberwarfare through the historical, operational and strategic perspectives of cyberattacks.<br /> Cyberwar and Information Warfare is of extreme use to experts in security studies and intelligence studies, defense universities, ministries of defense and security, and anyone studying political sciences, international relations, geopolitics, information technologies, etc.
<p>Introduction ix<br /> Daniel VENTRE</p> <p>List of Acronyms xvii</p> <p><b>Chapter 1. Cyberwar and its Borders 1<br /> </b>François-Bernard HUYGHE</p> <p>1.1. The seduction of cyberwar 2</p> <p>1.2. Desirable, vulnerable and frightening information 4</p> <p>1.3. Conflict and its dimensions 6</p> <p>1.4. The Helm and space 8</p> <p>1.5. Between knowledge and violence 11</p> <p>1.6. Space, distance and paths 13</p> <p>1.7. The permanency of war 16</p> <p>1.8. No war without borders 22</p> <p>1.9. The enemy and the sovereign 25</p> <p>1.10. Strengths and weaknesses 27</p> <p>1.11. Bibliography 29</p> <p><b>Chapter 2. War of Meaning, Cyberwar and Democracies 31</b><br /> François CHAUVANCY</p> <p>2.1. Introduction 31</p> <p>2.2. Informational environment, a new operating space for strategy 34</p> <p>2.3. Influence strategy: defeating and limiting armed force physical involvement 59</p> <p>2.4. Conclusion 78</p> <p>2.5. Bibliography 79</p> <p><b>Chapter 3. Intelligence, the First Defense? Information Warfare and Strategic Surprise 83</b><br /> Joseph HENROTIN</p> <p>3.1. Information warfare, information and war 85</p> <p>3.2. Intelligence and strategic surprise 90</p> <p>3.3. Strategic surprise and information warfare 98</p> <p>3.4. Concluding remarks: surprise in strategic studies 106</p> <p>3.5. Bibliography 109<br /> <br /> <b>Chapter 4. Cyberconflict: Stakes of Power 113</b><br /> Daniel VENTRE</p> <p>4.1. Stakes of power 113</p> <p>4.2. The Stuxnet affair 230</p> <p>4.3. Bibliography 240</p> <p><b>Chapter 5. Operational Aspects of a Cyberattack: Intelligence, Planning and Conduct 245</b><br /> Eric FILIOL</p> <p>5.1. Introduction 245</p> <p>5.2. Towards a broader concept of cyberwar 247</p> <p>5.3. Concept of critical infrastructure 253</p> <p>5.4. Different phases of a cyberattack 260</p> <p>5.5. A few “elementary building blocks” 268</p> <p>5.6. Example scenario 273</p> <p>5.7. Conclusion 281</p> <p>5.8. Bibliography 282</p> <p><b>Chapter 6. Riots in Xinjiang and Chinese Information Warfare 285</b><br /> Daniel VENTRE</p> <p>6.1. Xinjiang region: an explosive context 287</p> <p>6.2. Riots, July 2009 291</p> <p>6.3. Impacts on Chinese cyberspace: hacktivism and site defacing 303</p> <p>6.4. Managing the “cyberspace” risk by the Chinese authorities 339</p> <p>6.5. Chinese information warfare through the Xinjiang crisis 354</p> <p>6.6. Conclusion 361</p> <p>6.7. Bibliography 364</p> <p><b>Chapter 7. Special Territories 367</b><br /> Daniel VENTRE</p> <p>7.1. Hong Kong: intermediate zone 367</p> <p>7.2. North Korea: unknown figure of asymmetrical threat 379</p> <p>7.3. Bibliography 393</p> <p><b>Conclusion 395</b><br /> Daniel VENTRE</p> <p>List of Authors 401</p> <p>Index 403</p>
<p><strong>Daniel Ventre</strong> is an engineer at the CNRS and a lecturer at both the école Nationale Superieure des Telecommunications de Paris and ESSEC Business School in France.

Diese Produkte könnten Sie auch interessieren:

Intelligent Internet Knowledge Networks
Intelligent Internet Knowledge Networks
von: Syed V. Ahamed
PDF ebook
144,99 €
Applied Cryptanalysis
Applied Cryptanalysis
von: Mark Stamp, Richard M. Low
PDF ebook
114,99 €
Connections
Connections
von: H. Peter Alesso, Craig F. Smith
PDF ebook
69,99 €