|
|
|
|
LEADER |
05999nam a2200253 u 4500 |
001 |
10107134 |
003 |
upatras |
005 |
20210118224529.0 |
008 |
050613s gre |
020 |
|
|
|a 089006511X
|
040 |
|
|
|a Ινστιτούτο Τεχνολογίας Υπολογιστών
|c Ινστιτούτο Τεχνολογίας Υπολογιστών
|
040 |
|
|
|a XX-XxUND
|c Ινστιτούτο Τεχνολογίας Υπολογιστών
|
082 |
1 |
4 |
|a 355.3 43
|2 21η
|
245 |
1 |
0 |
|a Information Warfare
|b Principles and Operations
|c Edward Waltz
|
260 |
|
|
|a Boston
|b Artech House
|c c1998
|
300 |
|
|
|a xiv, 397p.
|b fig.,tabl.
|
504 |
|
|
|a includes endnotes, index : pp. 385 - 397
|
505 |
1 |
|
|a Preface
|a 1. Concepts of Information in Warfare
|a 1.1 Information's Role in Walfare
|a 1.2 An Information Model of Warfare
|a 1.3 The Transformations of Warfare
|a 1.4 The Forms of Information Warfare
|a 1.5 Defining Information Warfare and Information Operations
|a 1.5.1 A Functional Taxonomy of Information Warfare
|a 1.5.2 A Taxonomy of Military Operations for Information Warfare
|a 1.6 Expanse of the Information Warfare Battlespace
|a 1.7 The U.S. Transition to Information Warfare
|a 1.8 Information Warfare and the Military Disciplines
|a 1.9 Information and Peace
|a 1.10 The Current State of Information Warfare
|a 1.10.1 State of the Military Art
|a 1.10.2 State of Operational Implementation
|a 1.10.3 State of Relevant Information Warfare Technology
|a 1.11 Summary
|a Endnotes
|a Part I Information - Based Warfare
|a 2. The Role of Information Science in Warfare
|a 2.1 The Meaning of Information
|a 2.2 Information Science
|a 2.2.1 Philosophy (Epistemology)
|a 2.2.2 Philosophy (Logic)
|a 2.2.3 Information (Logic)
|a 2.2.4 Decision Theory
|a 2.2.5 Semiotic Theory
|a 2.2.6 Knowledge Management
|a 2.3 Comparison of Approaches
|a 2.4 Measuring the Utility of Information in Warface
|a 2.5 Translating Science to Technology
|a Endnotes
|a 3. The Role of Technology in Information - Based Warfare
|a 3.1 Knowledge - Creation Processes
|a 3.2 Knowledge Detection and Discovery
|a 3.3 Knowledge Creation in the OODA Loop
|a 3.4 Deductive Data Fusion
|a 3.5 Abductive - Inductive Data Mining
|a 3.6 Integrating Information Technologies
|a 3.7 Summary
|a Endnotes
|a 4. Achieving Information Superiority Through Dominant Battlespace Awareness and Knowledge
|a 4.1 Principles of Information Superiority
|a 4.1.1 Intelligence, Surveillance, and Reconnaissance(ISR)
|a 4.2 Battlespace Information Architecture
|a 4.3 Summary
|a Endnotes
|a Part II Information Operations for Information Warfare
|a 5. Information Warfare Policy, Strategy, and Operations
|a 5.1 Information Warface Policy, Strategy
|a 5.2 An Operational Model of Information Warfare
|a 5.3 Defensive Operations
|a 5.4 Offensive Operations
|a 5.5 Implementing Information Warfare Policy and Stratergy
|a Endnotes
|a 6. The Elements of Information Operations
|a 6.1 The Targets of information Operations
|a 6.1.1 The Global Information Infrastructure (GII)
|a 6.1.2 The National Information Infrastructure (NII)
|a 6.1.3 Defense Information Infrastructure (DII)
|a 6.2 Information Infrastructure War Forms
|a 6.3 Information Operations for Network Warfare
|a 6.3.1 A Representative netwar Scenario
|a 6.3.2 Taxonomy of Netwar Elements and Supporting Disciplines
|a 6.4 Information Operations for Command and Cantrol Warfare(C2W)
|a 6.4.1 A Representative C2W Scenario
|a 6.4.2 Taxonomy of C2W Functional Elements and Supporting Disciplines
|a 6.5 The Component Disciplines of Information Operations
|a 6.5.1 Psychological Operations (PSYOPS)
|a 6.5.2 Operational Deception
|a 6.5.3 Electronic Operations
|a 6.5.4 Physical Destruction
|a 6.5.5 Intelligence
|a 6.5.6 Counterintelligence
|a 6.5.7 Information Security (INFOSEC)
|a 6.5.8 Operational Security (OPSEC)
|a 6.6 Summary
|a Endnotes
|a 7. An Operational Concept (CONOPS) for Information Operations
|a Endnotes
|a 8. Offensive Information Operations
|a 8.1 Fundamental Elements of Information Attack
|a 8.2 The Weapons of Information Warfare
|a 8.3 Network Attack Tactics
|a 8.3.1 Network Attack Vulnerabilities and Categories
|a 8.3.2 Network Attack Processes
|a 8.3.3 Internet Service Attacks
|a 8.4 Command and Control Warfare Attack Tacties
|a 8.4.1 Command and Control Network Vulnerabilities
|a 8.4.2 Attack Categories for Data Fusion Systems
|a 8.4.3 Attack Matrix for C41 Data Fusion
|a 8.5 IW Targeting and Weaponeering Considerations
|a 8.6 Information - Level (Network) Attack Techniques
|a 8.6.1 Intelligence and Targeting
|a 8.6.2 Weapon Delivery
|a 8.6.3 Information weapons
|a 8.7 Physical - Level Attack Techniques
|a 8.7.1 Kinetic Energy Weapons
|a 8.7.2 Chemical and Biological weapons (CBW)
|a 8.7.3 Directed Energy Weapons (DEW)
|a 8.7.4 Passive Conductive Measures
|a 8.8 Offensive Operations Analysis, Simulation, and War Gaming
|a 8.9 Summary
|a Endnotes
|a 9. Defensive Information Operations
|a 9.1 Fundamental Elements of Information Assurance
|a 9.2 Principles of Trusted Computing and Networking
|a 9.3 Authentication and Access Control
|a 9.3.1 Secure Authentication and Access Control Functions
|a 9.3.2 Secure Access Systems: Firewalls
|a 9.4 Cryptographic Encryption Measures
|a 9.4.1 Ancryption Alternatives
|a 9.4.2 Digital Signatures
|a 9.4.3 Key Management
|a 9.5 Incident Detection and Response
|a 9.6 Survivable Information Structures
|a 9.7 Defense Tools and Services
|a 9.8 Physical - level System Security
|a 9.9 Security Analysis and Simulation for Defensive Operations
|a 9.10 Summary
|a Endnotes
|a 10. The Technologies of information Warfare
|a 10.1 A Technology Assessment
|a 10.2 Information Dominance Technologies
|a 10.2.1 Collection Technologies
|a 10.2.2 Processing Technologies
|a 10.2.3 Dissemination and Presentation Technologies
|a 10.3 Offensive Technologies
|a 10.4 Defensive Technologies
|a 10.5 Summary
|a Endnotes
|a About the Author
|a Index
|
650 |
|
4 |
|a Πληροφορία, Οργάνωσή της
|9 24361
|
700 |
1 |
|
|a WALTZ, EDWARD
|4 aut
|9 128032
|
852 |
|
|
|a GR-PaULI
|b ΠΑΤΡΑ
|b ΤΜΗΥΠ
|h 355.3 43
|t 1
|
942 |
|
|
|2 ddc
|
999 |
|
|
|c 93277
|d 93277
|
952 |
|
|
|0 0
|1 0
|4 0
|6 355_300000000000000_43
|7 0
|9 142654
|a CEID
|b CEID
|d 2016-04-24
|l 0
|o 355.3 43
|r 2016-04-24
|t 1
|w 2016-04-24
|