Information Warfare Principles and Operations

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριος συγγραφέας: WALTZ, EDWARD (Συγγραφέας)
Μορφή: Βιβλίο
Γλώσσα:Greek
Έκδοση: Boston Artech House c1998
Θέματα:
LEADER 05999nam a2200253 u 4500
001 10107134
003 upatras
005 20210118224529.0
008 050613s gre
020 |a 089006511X 
040 |a Ινστιτούτο Τεχνολογίας Υπολογιστών  |c Ινστιτούτο Τεχνολογίας Υπολογιστών 
040 |a XX-XxUND  |c Ινστιτούτο Τεχνολογίας Υπολογιστών 
082 1 4 |a 355.3 43  |2 21η 
245 1 0 |a Information Warfare  |b Principles and Operations  |c Edward Waltz 
260 |a Boston  |b Artech House  |c c1998 
300 |a xiv, 397p.  |b fig.,tabl. 
504 |a includes endnotes, index : pp. 385 - 397 
505 1 |a Preface  |a 1. Concepts of Information in Warfare  |a 1.1 Information's Role in Walfare  |a 1.2 An Information Model of Warfare  |a 1.3 The Transformations of Warfare  |a 1.4 The Forms of Information Warfare  |a 1.5 Defining Information Warfare and Information Operations  |a 1.5.1 A Functional Taxonomy of Information Warfare  |a 1.5.2 A Taxonomy of Military Operations for Information Warfare  |a 1.6 Expanse of the Information Warfare Battlespace  |a 1.7 The U.S. Transition to Information Warfare  |a 1.8 Information Warfare and the Military Disciplines  |a 1.9 Information and Peace  |a 1.10 The Current State of Information Warfare  |a 1.10.1 State of the Military Art  |a 1.10.2 State of Operational Implementation  |a 1.10.3 State of Relevant Information Warfare Technology  |a 1.11 Summary  |a Endnotes  |a Part I Information - Based Warfare  |a 2. The Role of Information Science in Warfare  |a 2.1 The Meaning of Information  |a 2.2 Information Science  |a 2.2.1 Philosophy (Epistemology)  |a 2.2.2 Philosophy (Logic)  |a 2.2.3 Information (Logic)  |a 2.2.4 Decision Theory  |a 2.2.5 Semiotic Theory  |a 2.2.6 Knowledge Management  |a 2.3 Comparison of Approaches  |a 2.4 Measuring the Utility of Information in Warface  |a 2.5 Translating Science to Technology  |a Endnotes  |a 3. The Role of Technology in Information - Based Warfare  |a 3.1 Knowledge - Creation Processes  |a 3.2 Knowledge Detection and Discovery  |a 3.3 Knowledge Creation in the OODA Loop  |a 3.4 Deductive Data Fusion  |a 3.5 Abductive - Inductive Data Mining  |a 3.6 Integrating Information Technologies  |a 3.7 Summary  |a Endnotes  |a 4. Achieving Information Superiority Through Dominant Battlespace Awareness and Knowledge  |a 4.1 Principles of Information Superiority  |a 4.1.1 Intelligence, Surveillance, and Reconnaissance(ISR)  |a 4.2 Battlespace Information Architecture  |a 4.3 Summary  |a Endnotes  |a Part II Information Operations for Information Warfare  |a 5. Information Warfare Policy, Strategy, and Operations  |a 5.1 Information Warface Policy, Strategy  |a 5.2 An Operational Model of Information Warfare  |a 5.3 Defensive Operations  |a 5.4 Offensive Operations  |a 5.5 Implementing Information Warfare Policy and Stratergy  |a Endnotes  |a 6. The Elements of Information Operations  |a 6.1 The Targets of information Operations  |a 6.1.1 The Global Information Infrastructure (GII)  |a 6.1.2 The National Information Infrastructure (NII)  |a 6.1.3 Defense Information Infrastructure (DII)  |a 6.2 Information Infrastructure War Forms  |a 6.3 Information Operations for Network Warfare  |a 6.3.1 A Representative netwar Scenario  |a 6.3.2 Taxonomy of Netwar Elements and Supporting Disciplines  |a 6.4 Information Operations for Command and Cantrol Warfare(C2W)  |a 6.4.1 A Representative C2W Scenario  |a 6.4.2 Taxonomy of C2W Functional Elements and Supporting Disciplines  |a 6.5 The Component Disciplines of Information Operations  |a 6.5.1 Psychological Operations (PSYOPS)  |a 6.5.2 Operational Deception  |a 6.5.3 Electronic Operations  |a 6.5.4 Physical Destruction  |a 6.5.5 Intelligence  |a 6.5.6 Counterintelligence  |a 6.5.7 Information Security (INFOSEC)  |a 6.5.8 Operational Security (OPSEC)  |a 6.6 Summary  |a Endnotes  |a 7. An Operational Concept (CONOPS) for Information Operations  |a Endnotes  |a 8. Offensive Information Operations  |a 8.1 Fundamental Elements of Information Attack  |a 8.2 The Weapons of Information Warfare  |a 8.3 Network Attack Tactics  |a 8.3.1 Network Attack Vulnerabilities and Categories  |a 8.3.2 Network Attack Processes  |a 8.3.3 Internet Service Attacks  |a 8.4 Command and Control Warfare Attack Tacties  |a 8.4.1 Command and Control Network Vulnerabilities  |a 8.4.2 Attack Categories for Data Fusion Systems  |a 8.4.3 Attack Matrix for C41 Data Fusion  |a 8.5 IW Targeting and Weaponeering Considerations  |a 8.6 Information - Level (Network) Attack Techniques  |a 8.6.1 Intelligence and Targeting  |a 8.6.2 Weapon Delivery  |a 8.6.3 Information weapons  |a 8.7 Physical - Level Attack Techniques  |a 8.7.1 Kinetic Energy Weapons  |a 8.7.2 Chemical and Biological weapons (CBW)  |a 8.7.3 Directed Energy Weapons (DEW)  |a 8.7.4 Passive Conductive Measures  |a 8.8 Offensive Operations Analysis, Simulation, and War Gaming  |a 8.9 Summary  |a Endnotes  |a 9. Defensive Information Operations  |a 9.1 Fundamental Elements of Information Assurance  |a 9.2 Principles of Trusted Computing and Networking  |a 9.3 Authentication and Access Control  |a 9.3.1 Secure Authentication and Access Control Functions  |a 9.3.2 Secure Access Systems: Firewalls  |a 9.4 Cryptographic Encryption Measures  |a 9.4.1 Ancryption Alternatives  |a 9.4.2 Digital Signatures  |a 9.4.3 Key Management  |a 9.5 Incident Detection and Response  |a 9.6 Survivable Information Structures  |a 9.7 Defense Tools and Services  |a 9.8 Physical - level System Security  |a 9.9 Security Analysis and Simulation for Defensive Operations  |a 9.10 Summary  |a Endnotes  |a 10. The Technologies of information Warfare  |a 10.1 A Technology Assessment  |a 10.2 Information Dominance Technologies  |a 10.2.1 Collection Technologies  |a 10.2.2 Processing Technologies  |a 10.2.3 Dissemination and Presentation Technologies  |a 10.3 Offensive Technologies  |a 10.4 Defensive Technologies  |a 10.5 Summary  |a Endnotes  |a About the Author  |a Index 
650 4 |a Πληροφορία, Οργάνωσή της  |9 24361 
700 1 |a WALTZ, EDWARD  |4 aut  |9 128032 
852 |a GR-PaULI  |b ΠΑΤΡΑ  |b ΤΜΗΥΠ  |h 355.3 43  |t 1 
942 |2 ddc 
999 |c 93277  |d 93277 
952 |0 0  |1 0  |4 0  |6 355_300000000000000_43  |7 0  |9 142654  |a CEID  |b CEID  |d 2016-04-24  |l 0  |o 355.3 43  |r 2016-04-24  |t 1  |w 2016-04-24