Library Logo

Cyberwar and information warfare / (Record no. 206445)

000 -LEADER
fixed length control field 06110cam a2200733Ka 4500
001 - CONTROL NUMBER
control field ocn827947140
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20171107094225.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu---unuuu
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 130218s2011 enka ob 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781118603390
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1118603397
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781118603482
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1118603486
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781118603512
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1118603516
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781848213043
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 1848213042
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier CHNEW
System control number 000599580
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier DEBBG
System control number BV041907976
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier DEBBG
System control number BV042032227
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier DEBBG
System control number BV043395432
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier DEBSZ
System control number 414176944
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier NZ1
System control number 15915663
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)827947140
Canceled/invalid control number (OCoLC)827207661
-- (OCoLC)878048968
-- (OCoLC)878049080
-- (OCoLC)878049294
-- (OCoLC)878059852
037 ## - SOURCE OF ACQUISITION
Stock number CL0500000416
Source of stock number/acquisition Safari Books Online
040 ## - CATALOGING SOURCE
Original cataloging agency N$T
Language of cataloging eng
Description conventions pn
Transcribing agency N$T
Modifying agency YDXCP
-- DG1
-- IDEBK
-- E7B
-- OCLCF
-- UMI
-- UKDOC
-- DEBBG
-- EBLCP
-- MHW
-- OCLCQ
-- COO
-- OCLCQ
049 ## - LOCAL HOLDINGS (OCLC)
Holding library MAIN
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number U163
Item number .C937 2011eb
072 #7 - SUBJECT CATEGORY CODE
Subject category code HIS
Subject category code subdivision 027010
Source bisacsh
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 355.3/43
Edition number 23
245 00 - TITLE STATEMENT
Title Cyberwar and information warfare /
Statement of responsibility, etc. edited by Daniel Ventre.
Medium [electronic resource]
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc. London :
Name of publisher, distributor, etc. ISTE ;
Place of publication, distribution, etc. Hoboken, NJ :
Name of publisher, distributor, etc. John Wiley,
Date of publication, distribution, etc. 2011.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (xix, 412 pages) :
Other physical details illustrations.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
490 1# - SERIES STATEMENT
Series statement ISTE
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Cover; Cyberwar and Information Warfare; Title Page; Copyright Page; Table of Contents; Introduction; List of Acronyms; Chapter 1. Cyberwar and its Borders; 1.1. The seduction of cyberwar; 1.2. Desirable, vulnerable and frightening information; 1.3. Conflict and its dimensions; 1.4. The Helm and space; 1.5. Between knowledge and violence; 1.6. Space, distance and paths; 1.7. The permanency of war; 1.8. No war without borders; 1.9. The enemy and the sovereign; 1.10. Strengths and weaknesses; 1.11. Bibliography; Chapter 2. War of Meaning, Cyberwar and Democracies; 2.1. Introduction.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 2.2. Informational environment, a new operating space for strategy2.2.1. War and information: stakes for the West; 2.2.2. Strategy in the information environment; 2.2.3. Winning the battle of legitimacies; 2.3. Influence strategy: defeating and limiting armed force physical involvement; 2.3.1. Describing the aggressor; 2.3.2. Armed forces and the information environment; 2.3.3. The need for moral force; 2.4. Conclusion; 2.5. Bibliography; Chapter 3. Intelligence, the First Defense? Information Warfare and Strategic Surprise; 3.1. Information warfare, information and war.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 3.2. Intelligence and strategic surprise3.2.1. Strategic surprise; 3.2.2. Perception of surprise; 3.2.3. Perception of the possibility of surprise; 3.3. Strategic surprise and information warfare; 3.4. Concluding remarks: surprise in strategic studies; 3.5. Bibliography; Chapter 4. Cyberconflict: Stakes of Power; 4.1. Stakes of power; 4.1.1. Power relations; 4.1.2. Expression of sovereignty; 4.1.3. Cyberpower; 4.1.4. Measuring and locating power; 4.1.5. Limits of exercising power; 4.1.6. The Monroe doctrine; 4.1.7. Globalization; 4.1.8. Shock theories; 4.1.9. Naval and maritime power strategy.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 4.1.10. Air/space and cybernetic power: analogies4.1.11. Cyberconflict/cyber weapons, chemical/biological weapons: comparisons; 4.1.12. Cyberconflict/cyber weapons, Cold War, nuclear weapons: comparisons; 4.1.13. Cyberconflict and new wars; 4.2. The Stuxnet affair; 4.3. Bibliography; Chapter 5. Operational Aspects of a Cyberattack: Intelligence, Planning and Conduct; 5.1. Introduction; 5.2. Towards a broader concept of cyberwar; 5.2.1. War and cyberwar: common ground; 5.2.2. New orders in cyberwar; 5.2.3. Who are cyberwarriors?; 5.2.4. Is formalization possible?
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 5.3. Concept of critical infrastructure5.3.1. Generalized definition of the notion of critical infrastructure; 5.3.2. System interdependence; 5.4. Different phases of a cyberattack; 5.4.1. Intelligence phase; 5.4.2. Planning phase; 5.4.3. Conduct phase; 5.5. A few "elementary building blocks"; 5.5.1. General tactical framework; 5.5.2. Attacks on people; 5.5.3. Opinion manipulation and area control; 5.5.4. Military computer attack in a conventional operation; 5.6. Example scenario; 5.6.1. Tactical scenario; 5.6.2. The order of events; 5.6.3. Analysis; 5.7. Conclusion; 5.8. Bibliography.
520 ## - SUMMARY, ETC.
Summary, etc. Integrating empirical, conceptual, and theoretical approaches, this book presents the thinking of researchers and experts in the fields of cybersecurity, cyberdefense, and information warfare. The aim of this book is to analyze the processes of information warfare and cyberwarfare through the historical, operational and strategic perspectives of cyberattacks. Cyberwar and Information Warfare is of extreme use to experts in security studies and intelligence studies, defense universities, ministries of defense and security, and anyone studying political sciences, international relations, g.
588 0# - SOURCE OF DESCRIPTION NOTE
Source of description note Print version record.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information warfare.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Psychological warfare.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer crimes.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer crimes.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information warfare.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Psychological warfare.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element HISTORY
General subdivision Military
-- Biological & Chemical Warfare.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer crimes.
Source of heading or term fast
Authority record control number (OCoLC)fst00872063
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information warfare.
Source of heading or term fast
Authority record control number (OCoLC)fst00973186
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Psychological warfare.
Source of heading or term fast
Authority record control number (OCoLC)fst01081405
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Ventre, Daniel.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
Title Cyberwar and information warfare.
Place, publisher, and date of publication London : ISTE ; Hoboken, NJ : John Wiley, 2011
International Standard Book Number 9781848213043
Record control number (DLC) 2011024020
-- (OCoLC)729721299
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title ISTE.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://onlinelibrary.wiley.com/book/10.1002/9781118603482
Public note Wiley Online Library
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Books

No items available.

Last Updated on September 15, 2019
© Dhaka University Library. All Rights Reserved|Staff Login