- Series: Artech House Computer Science Library
- Hardcover: 416 pages
- Publisher: Artech Print on Demand (August 31, 1998)
- Language: English
- ISBN-10: 089006511X
- ISBN-13: 978-0890065112
- Product Dimensions: 6 x 1.1 x 9 inches
- Shipping Weight: 1.6 pounds (View shipping rates and policies)
- Average Customer Review: 4 customer reviews
- Amazon Best Sellers Rank: #2,088,775 in Books (See Top 100 in Books)
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Information Warfare Principles and Operations (Artech House Computer Science Library)
Use the Amazon App to scan ISBNs and compare prices.
See the Best Books of 2018 So Far
Looking for something great to read? Browse our editors' picks for the best books of the year so far in fiction, nonfiction, mysteries, children's books, and much more.
About the Author
Edward Waltz is responsible for the development of information science and technology programs at ERIM International, including information understanding (data fusion, data mining and information visualization) and information warfare activities. He oversees the development of new technology applications in intelligence, military and emerging commercial markets. He is co-author of Multisensor Data Fusion, also published by Artech House.
Top customer reviews
There was a problem filtering reviews right now. Please try again later.
The framework itself is sound and is the foundation of any infowar readiness posture. The book emphasizes a readiness posture that is defensive in nature, and the approach set forth addresses both strategic and tactical defense considerations.
There are a three of interesting viewpoints provides, which is consistent with the systems engineering approach taken: (1) hierarchy of strategic components. These are presented topdown with defense and deterrence paths as follows: Policy, Strategy and Operational levels and Operational Influence Relationships. (2) A strategic process that encompasses development of strategy, threat analysis and assessment of effectiveness. (3) Operational model, comprised of perceptual, information and physical layers.
Issues such as MEII (Minimum Essential Information Infrastructure deployment and modes of operations are cogently discussed along with associated tactical responses (surveillance, mode control, auditing/forensic analysis and reporting). The conceptual and process framework is augmented by a solid discussion of security technologies that are still in the large as accurate and valid today as when the book was written in 1998.
What I especially like about this book, aside from the systems engineering approach and viewpoints, is the complete coverage of the full spectrum of information warfare, including more subtle issues such as data and knowledge analysis, the cursory examination of offensive operations (seeing the info war from a hostile's viewpoint), and the copious amount of detail provided for each of the topics and subjects associated with infowar.
This book is an excellent starting point for corporate security organs that have matured to the point where infowar defensive measures can be effectively addressed. Although infowar is an element of information security, the mindset for defense requires a vastly more mature security program than normal network and system security practices because the threats may not be strictly technical in nature. This book will prepare you for the realities of infowar and give you insights about how it can be incorporated into your security posture.