Listing 1 - 10 of 120 | << page >> |
Sort by
|
Choose an application
Clarifies a critical topic for today's leaders
Choose an application
Choose an application
Choose an application
The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive and defensive tools, tactics and procedures, including computer network exploitation (CNE), attack (CNA) and defense (CND). Readers learn the basics of how to defend against espionage, hacking, insider threats, state-sponsored attacks, and non-state actors (such as organized criminals and terrorists). Finally, the book looks ahe
Internet --- Computer networks --- Information warfare. --- Security measures.
Choose an application
"As a society that has revered learning and education for millennia, China has a long history of valuing information. As early as the 1980s, the People's Republic of China (PRC) began to pay attention to information technology."--Provided by publisher.
Choose an application
Choose an application
"Stalin was a master of deception, disinformation, and camouflage, by means of which he gained supremacy over China and defeated imperialism on Chinese soil. This book examines Stalin's covert operations in his hunt for supremacy. By the late 1920s Britain had ceded place to Japan as Stalin's main enemy in Asia. By seducing Japan deeply into China, Stalin successfully turned Japan's aggression into a weapon of its own destruction. The book examines Stalin's covert operations from the murder of the Manchurian warlord Zhang Zuolin in 1928 and the publication of the forged "Tanaka Memorial" in 1929, to Stalin's hidden role in Japan's invasion of Manchuria in 1931, the outbreak of all-out war between China and Japan in 1937, and Japan's defeat in 1945. In the shadow of these and other events we find Stalin and his secret operatives, including many Chinese and Japanese collaborators, most notably Zhang Xueliang and Kōmoto Daisaku, the self-professed assassin of Zhang Zuolin. The book challenges accounts of the turbulent history of inter-war East Asia that have ignored or minimized Stalin's presence and instead exposes and analyzes Stalin's secret modus operandi, modernized as "hybrid war" in today's Russia. The book is essential for students and specialists of Stalin, China, the Soviet Union, Japan, and East Asia"
Choose an application
Information Warfare recognizes that a communication strategy is an intrinsic component of a national strategy. Farwell builds on the foundation laid by historical and contemporary thinkers who recognized the need to forge a communication strategy to conduct effective information warfare. The author defines a communication/information warfare strategy that is persuasive and credible. He distills key factors to frame the strategic thinking for information warfare. The book is innovatively organized in two parts: First, Farwell delivers a concise treatise about the key steps for a communication strategy. It includes historical and current examples that offer deep insights. Deference is made to the military concept of operational art. The examples illustrate the environment, the problem to be addressed, and the approach to be used. This instructional section is amply footnoted to provide tremendous depth. Second, an easy-to-use workbook employs a step-by-step methodology with questions for the reader to address in creating and evaluating their own communication strategies"--
Information Warfare. --- Strategy. --- Communication --- Communication, Primitive --- Mass communication --- Sociology --- Military strategy --- Military art and science --- Military doctrine --- Communication. --- Information warfare. --- information warfare --- communication strategies --- military strategy
Choose an application
Explains the critical importance of information operations in future conflict
Choose an application
Internet is entering a stage which will have a stronger impact on the daily lives of all kinds of organizations.
Computer networks --- Information warfare --- Military art and science --- Security measures
Listing 1 - 10 of 120 | << page >> |
Sort by
|