Counterdeception principles and applications for national security:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Norwood, MA
Artech House
2007
|
Schriftenreihe: | Artech House intelligence and information operations library
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Includes bibliographical references and index Foreword; Preface; Chapter 1 Deception and the Need for Counterdeception 1; Chapter 2 Introduction to Deception Principles; Chapter 3 The Cognitive Aspects of Deception: Why Does Deception Work?; Chapter 4 Technical Methods of Deception; Chapter 5 Principles of Counterdeception; Chapter 6 Nontechnical Approaches to Counterdeception; Chapter 7 Technical Methods of Counterdeception; Chapter 8 Counterdeception Architectures and Technologies; Chapter 9 Speculations About the Future of Deception and Counterdeception; About the Authors; Index Today, more than ever, the use of denial and deception (D&D) is being used to compensate for an opponent?s military superiority, to obtain or develop weapons of mass destruction, and to violate international agreements and sanctions. Although the historical literature on the use of strategic deception is widely available, technical coverage of the subject is scattered in hard-to-find and out-of-print sources. This is the first technical volume to offer a current, comprehensive and systematic overview of the concepts and methods that underlie strategic deception and, more importantly, to provid |
Beschreibung: | 1 Online-Ressource (xiv, 335 p.) |
ISBN: | 1580539351 158053936X 9781580539357 9781580539364 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043114049 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2007 |||| o||u| ||||||eng d | ||
020 | |a 1580539351 |9 1-58053-935-1 | ||
020 | |a 158053936X |c electronic bk. |9 1-58053-936-X | ||
020 | |a 9781580539357 |9 978-1-58053-935-7 | ||
020 | |a 9781580539364 |c electronic bk. |9 978-1-58053-936-4 | ||
035 | |a (OCoLC)427509686 | ||
035 | |a (DE-599)BVBBV043114049 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 355.41 |2 22 | |
100 | 1 | |a Bennett, Michael |e Verfasser |4 aut | |
245 | 1 | 0 | |a Counterdeception principles and applications for national security |c Michael Bennett, Edward Waltz |
264 | 1 | |a Norwood, MA |b Artech House |c 2007 | |
300 | |a 1 Online-Ressource (xiv, 335 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Artech House intelligence and information operations library | |
500 | |a Includes bibliographical references and index | ||
500 | |a Foreword; Preface; Chapter 1 Deception and the Need for Counterdeception 1; Chapter 2 Introduction to Deception Principles; Chapter 3 The Cognitive Aspects of Deception: Why Does Deception Work?; Chapter 4 Technical Methods of Deception; Chapter 5 Principles of Counterdeception; Chapter 6 Nontechnical Approaches to Counterdeception; Chapter 7 Technical Methods of Counterdeception; Chapter 8 Counterdeception Architectures and Technologies; Chapter 9 Speculations About the Future of Deception and Counterdeception; About the Authors; Index | ||
500 | |a Today, more than ever, the use of denial and deception (D&D) is being used to compensate for an opponent?s military superiority, to obtain or develop weapons of mass destruction, and to violate international agreements and sanctions. Although the historical literature on the use of strategic deception is widely available, technical coverage of the subject is scattered in hard-to-find and out-of-print sources. This is the first technical volume to offer a current, comprehensive and systematic overview of the concepts and methods that underlie strategic deception and, more importantly, to provid | ||
650 | 7 | |a HISTORY / Military / Strategy |2 bisacsh | |
650 | 7 | |a Deception (Military science) |2 fast | |
650 | 7 | |a Disinformation |2 fast | |
650 | 7 | |a National security |2 fast | |
650 | 4 | |a Deception (Military science) | |
650 | 4 | |a Disinformation | |
650 | 4 | |a National security | |
650 | 0 | 7 | |a Sicherheitspolitik |0 (DE-588)4116489-1 |2 gnd |9 rswk-swf |
651 | 7 | |a USA |0 (DE-588)4078704-7 |2 gnd |9 rswk-swf | |
689 | 0 | 0 | |a USA |0 (DE-588)4078704-7 |D g |
689 | 0 | 1 | |a Sicherheitspolitik |0 (DE-588)4116489-1 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Waltz, Edward |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=225182 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028538240 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=225182 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=225182 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175536839196672 |
---|---|
any_adam_object | |
author | Bennett, Michael |
author_facet | Bennett, Michael |
author_role | aut |
author_sort | Bennett, Michael |
author_variant | m b mb |
building | Verbundindex |
bvnumber | BV043114049 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)427509686 (DE-599)BVBBV043114049 |
dewey-full | 355.41 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 355 - Military science |
dewey-raw | 355.41 |
dewey-search | 355.41 |
dewey-sort | 3355.41 |
dewey-tens | 350 - Public administration and military science |
discipline | Militärwissenschaft |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03443nmm a2200565zc 4500</leader><controlfield tag="001">BV043114049</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2007 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1580539351</subfield><subfield code="9">1-58053-935-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">158053936X</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-58053-936-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781580539357</subfield><subfield code="9">978-1-58053-935-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781580539364</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-58053-936-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)427509686</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043114049</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">355.41</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Bennett, Michael</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Counterdeception principles and applications for national security</subfield><subfield code="c">Michael Bennett, Edward Waltz</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Norwood, MA</subfield><subfield code="b">Artech House</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xiv, 335 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Artech House intelligence and information operations library</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Foreword; Preface; Chapter 1 Deception and the Need for Counterdeception 1; Chapter 2 Introduction to Deception Principles; Chapter 3 The Cognitive Aspects of Deception: Why Does Deception Work?; Chapter 4 Technical Methods of Deception; Chapter 5 Principles of Counterdeception; Chapter 6 Nontechnical Approaches to Counterdeception; Chapter 7 Technical Methods of Counterdeception; Chapter 8 Counterdeception Architectures and Technologies; Chapter 9 Speculations About the Future of Deception and Counterdeception; About the Authors; Index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Today, more than ever, the use of denial and deception (D&D) is being used to compensate for an opponent?s military superiority, to obtain or develop weapons of mass destruction, and to violate international agreements and sanctions. Although the historical literature on the use of strategic deception is widely available, technical coverage of the subject is scattered in hard-to-find and out-of-print sources. This is the first technical volume to offer a current, comprehensive and systematic overview of the concepts and methods that underlie strategic deception and, more importantly, to provid</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">HISTORY / Military / Strategy</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Deception (Military science)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Disinformation</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">National security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Deception (Military science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Disinformation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">National security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitspolitik</subfield><subfield code="0">(DE-588)4116489-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Sicherheitspolitik</subfield><subfield code="0">(DE-588)4116489-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Waltz, Edward</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=225182</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028538240</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=225182</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=225182</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
geographic | USA (DE-588)4078704-7 gnd |
geographic_facet | USA |
id | DE-604.BV043114049 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:17:51Z |
institution | BVB |
isbn | 1580539351 158053936X 9781580539357 9781580539364 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028538240 |
oclc_num | 427509686 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xiv, 335 p.) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Artech House |
record_format | marc |
series2 | Artech House intelligence and information operations library |
spelling | Bennett, Michael Verfasser aut Counterdeception principles and applications for national security Michael Bennett, Edward Waltz Norwood, MA Artech House 2007 1 Online-Ressource (xiv, 335 p.) txt rdacontent c rdamedia cr rdacarrier Artech House intelligence and information operations library Includes bibliographical references and index Foreword; Preface; Chapter 1 Deception and the Need for Counterdeception 1; Chapter 2 Introduction to Deception Principles; Chapter 3 The Cognitive Aspects of Deception: Why Does Deception Work?; Chapter 4 Technical Methods of Deception; Chapter 5 Principles of Counterdeception; Chapter 6 Nontechnical Approaches to Counterdeception; Chapter 7 Technical Methods of Counterdeception; Chapter 8 Counterdeception Architectures and Technologies; Chapter 9 Speculations About the Future of Deception and Counterdeception; About the Authors; Index Today, more than ever, the use of denial and deception (D&D) is being used to compensate for an opponent?s military superiority, to obtain or develop weapons of mass destruction, and to violate international agreements and sanctions. Although the historical literature on the use of strategic deception is widely available, technical coverage of the subject is scattered in hard-to-find and out-of-print sources. This is the first technical volume to offer a current, comprehensive and systematic overview of the concepts and methods that underlie strategic deception and, more importantly, to provid HISTORY / Military / Strategy bisacsh Deception (Military science) fast Disinformation fast National security fast Deception (Military science) Disinformation National security Sicherheitspolitik (DE-588)4116489-1 gnd rswk-swf USA (DE-588)4078704-7 gnd rswk-swf USA (DE-588)4078704-7 g Sicherheitspolitik (DE-588)4116489-1 s 1\p DE-604 Waltz, Edward Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=225182 Aggregator Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Bennett, Michael Counterdeception principles and applications for national security HISTORY / Military / Strategy bisacsh Deception (Military science) fast Disinformation fast National security fast Deception (Military science) Disinformation National security Sicherheitspolitik (DE-588)4116489-1 gnd |
subject_GND | (DE-588)4116489-1 (DE-588)4078704-7 |
title | Counterdeception principles and applications for national security |
title_auth | Counterdeception principles and applications for national security |
title_exact_search | Counterdeception principles and applications for national security |
title_full | Counterdeception principles and applications for national security Michael Bennett, Edward Waltz |
title_fullStr | Counterdeception principles and applications for national security Michael Bennett, Edward Waltz |
title_full_unstemmed | Counterdeception principles and applications for national security Michael Bennett, Edward Waltz |
title_short | Counterdeception principles and applications for national security |
title_sort | counterdeception principles and applications for national security |
topic | HISTORY / Military / Strategy bisacsh Deception (Military science) fast Disinformation fast National security fast Deception (Military science) Disinformation National security Sicherheitspolitik (DE-588)4116489-1 gnd |
topic_facet | HISTORY / Military / Strategy Deception (Military science) Disinformation National security Sicherheitspolitik USA |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=225182 |
work_keys_str_mv | AT bennettmichael counterdeceptionprinciplesandapplicationsfornationalsecurity AT waltzedward counterdeceptionprinciplesandapplicationsfornationalsecurity |