The art of war in the network age: back to the future (Record no. 1809)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 01988nam a2200217 4500 |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20250804160727.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 250804b2016|||||||| |||| 00| 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| ISBN | 9781119361350 |
| 041 ## - LANGUAGE CODE | |
| Language code of text/sound track or separate title | English |
| 082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.8 |
| 100 ## - MAIN ENTRY--AUTHOR NAME | |
| Personal name | Henrotin, Joseph |
| Relator term | Author |
| 245 ## - TITLE STATEMENT | |
| Title | The art of war in the network age: back to the future |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
| Place of publication | New Jersey: |
| Name of publisher | Wiley Data and Cybersecurity, |
| Year of publication | 2016. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Number of Pages | xiii, 218p. |
| 500 ## - GENERAL NOTE | |
| General note | Previous studies have looked at the contribution of information technology and network theory to the art of warfare as understood in the broader sense. This book, however, focuses on an area particularly important in understanding the significance of the information revolution; its impact on strategic theory. The purpose of the book is to critically analyze the contributions and challenges that the spread of information technologies can bring to categories of classic strategic theory. In the first two chapters, the author establishes the context of the book, coming back to the epistemology of revolution in military affairs and its terminology. The third chapter examines the political bases of strategic action and operational strategy, before the next two chapters focus on historical construction of the process of getting to know your opponents and the way in which we consider information collection. Chapter 6 returns to the process of “informationalization” in the doctrine of armed forces, especially in Western countries, and methods of conducting network-centric warfare. The final chapter looks at the attempts of Western countries to adapt to the emergence of techno-guerrillas and new forms of hybrid warfare, and the resulting socio-strategic outcomes. |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Waging War in Network‐centric Conditions |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Striking in Network‐centric Conditions |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Web and Pervasive Computing |
| 856 ## - ELECTRONIC LOCATION AND ACCESS | |
| Uniform Resource Identifier | https://ieeexplore.ieee.org/servlet/opac?bknumber=9820803 |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Koha item type | e-Books |
| Withdrawn status | Lost status | Damaged status | Not for loan | Permanent Location | Current Location | Shelving location | Coded location qualifier | Full call number | Accession Number | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|
| Dr. S. R. Ranganathan Library | Dr. S. R. Ranganathan Library | Ebook (Online Access) | --- | 005.8 | EB0233 | e-Books |