Cargando…

21st century Chinese cyberwarfare : an examination of the Chinese cyberthreat from fundamentals of Communist policy regarding information warfare through the broad range of military, civilian and commercially supported cyberattack threat vectors /

21st Century Chinese Cyberwarfare draws from a combination of business, cultural, historical, linguistic and the author's personal experience to attempt to explain China to the uninitiated. The objective of the book is to raise awareness of the fact that the People's Republic of China is u...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Hagestad, William T., II (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Ely, Cambridgeshire, United Kingdom : IT Governance Publishing, 2012.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Ia 4500
001 JSTOR_ocn799769050
003 OCoLC
005 20231005004200.0
006 m o d
007 cr unu||||||||
008 121121s2012 enka ob 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d YDXCP  |d OCLCQ  |d DOS  |d N$T  |d UMI  |d B24X7  |d COO  |d DEBSZ  |d JSTOR  |d OCLCA  |d OCLCQ  |d OCLCO  |d NMC  |d VT2  |d S9I  |d UPM  |d OCLCQ  |d JBG  |d AGLDB  |d LIV  |d MERUC  |d OCLCQ  |d CUS  |d IOG  |d IYU  |d OCLCF  |d VNS  |d VTS  |d CEF  |d OCLCQ  |d WYU  |d LVT  |d TSC  |d STF  |d UAB  |d OCLCQ  |d VLY  |d UX1  |d OCLCO  |d OCLCQ 
066 |c $1 
019 |a 857716883  |a 884544873  |a 894391170  |a 1087379235  |a 1162478981  |a 1175634243 
020 |a 9781849283359  |q (electronic bk.) 
020 |a 1849283354  |q (electronic bk.) 
020 |a 9781849283663 
020 |a 1849283664 
020 |z 1849283346 
020 |z 9781849283342 
020 |a 1299468411 
020 |a 9781299468412 
029 1 |a AU@  |b 000052006211 
029 1 |a DEBBG  |b BV041432049 
029 1 |a DEBBG  |b BV043082376 
029 1 |a DEBSZ  |b 39827939X 
029 1 |a DEBSZ  |b 421257687 
029 1 |a DEBSZ  |b 431143692 
029 1 |a DEBSZ  |b 449303292 
029 1 |a GBVCP  |b 785370803 
035 |a (OCoLC)799769050  |z (OCoLC)857716883  |z (OCoLC)884544873  |z (OCoLC)894391170  |z (OCoLC)1087379235  |z (OCoLC)1162478981  |z (OCoLC)1175634243 
037 |a CL0500000277  |b Safari Books Online 
037 |a 22573/ctt4k5hnq  |b JSTOR 
043 |a a-cc--- 
050 4 |a HV6773.15.C97  |b H34 2012eb online 
072 7 |a COM  |x 032000  |2 bisacsh 
072 7 |a COM000000  |2 bisacsh 
072 7 |a COM053000  |2 bisacsh 
082 1 4 |a 303.48  |a 303.48/33 
049 |a UAMI 
100 1 |a Hagestad, William T.,  |c II,  |e author. 
245 1 0 |a 21st century Chinese cyberwarfare :  |b an examination of the Chinese cyberthreat from fundamentals of Communist policy regarding information warfare through the broad range of military, civilian and commercially supported cyberattack threat vectors /  |c William T. Hagestad II. 
246 3 |a Twenty-first century Chinese cyberwarfare 
260 |a Ely, Cambridgeshire, United Kingdom :  |b IT Governance Publishing,  |c 2012. 
300 |a 1 online resource (349 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
504 |a Includes bibliographical references. 
505 0 |a The Chinese cyberthreat -- Evolution of Chinese cyberwarfare -- Chinese unrestricted warfare -- Principles of warfare : West versus East -- Nature of information warfare -- Chinese cyberwarfare doctrines -- China's SIGINT capabilities -- Chinese IW capabilities -- The Chinese IW organizational structure -- Chinese commercial enterprises -- Commercial objectives of Chinese cyberattacks -- Chinese civilian hackers -- The Chinese cyberthreat : conclusions. 
520 |a 21st Century Chinese Cyberwarfare draws from a combination of business, cultural, historical, linguistic and the author's personal experience to attempt to explain China to the uninitiated. The objective of the book is to raise awareness of the fact that the People's Republic of China is using a combination of their unique culture, language, and political will, known as Chinese Communism, to maintain their cultural heritage. 
546 |a English. 
590 |a JSTOR  |b Books at JSTOR Demand Driven Acquisitions (DDA) 
590 |a JSTOR  |b Books at JSTOR Evidence Based Acquisitions 
590 |a JSTOR  |b Books at JSTOR All Purchased 
650 0 |a Cyberterrorism  |x Government policy  |z China. 
650 0 |a Information warfare  |x Government policy  |z China. 
650 0 |a Cyberspace  |x Government policy  |z China. 
650 0 |a Hackers  |x Government policy  |z China. 
650 0 |a Information warfare  |z China. 
650 0 |a Internet  |x Political aspects  |z China. 
650 0 |a Internet  |x Social aspects  |z China. 
650 6 |a Cyberterrorisme  |x Politique gouvernementale  |z Chine. 
650 6 |a Guerre de l'information  |x Politique gouvernementale  |z Chine. 
650 6 |a Cyberespace  |x Politique gouvernementale  |z Chine. 
650 6 |a Pirates informatiques  |x Politique gouvernementale  |z Chine. 
650 6 |a Guerre de l'information  |z Chine. 
650 6 |a Internet  |x Aspect politique  |z Chine. 
650 6 |a Internet  |x Aspect social  |z Chine. 
650 7 |a COMPUTERS  |x Information Technology.  |2 bisacsh 
650 7 |a COMPUTERS  |x General.  |2 bisacsh 
650 7 |a Cyberspace  |x Government policy.  |2 fast  |0 (OCoLC)fst00885796 
650 7 |a Information warfare.  |2 fast  |0 (OCoLC)fst00973186 
650 7 |a Internet  |x Political aspects.  |2 fast  |0 (OCoLC)fst00977197 
650 7 |a Internet  |x Social aspects.  |2 fast  |0 (OCoLC)fst01766793 
651 7 |a China.  |2 fast  |0 (OCoLC)fst01206073 
776 0 8 |i Print version:  |a Hagestad, William T., II.  |t 21st century Chinese cyberwarfare.  |d Cambridgeshire [England] : IT Governance Pub., 2012  |z 9781849283342  |w (OCoLC)769420458 
856 4 0 |u https://jstor.uam.elogim.com/stable/10.2307/j.ctt5hh5nz  |z Texto completo 
880 8 |6 505-00/$1  |a Rules of Engagement: PLA's Information Dominance chapter 7: China's SIGINT Capabilities; China and information warfare (IW): Signals Intelligence (SIGINT), Electronic Warfare (EW) and Cyberwarfare (CW); The PLA SIGINT ground stations; Airborne SIGINT capabilities; Chinese Naval SIGINT Activities; Chinese PLA Electronic warfare; Airborne EW systems; Chapter 8: Chinese IW Capabilities; Assessing China's IW Capabilities; Chapter 9: The Chinese IW Organizational Structure; Key PLA Departments: Integrated Network Electronic Warfare (INEW); General Staff Department Third Department总参三部. 
880 8 |6 505-00/$1  |a Warfare -- Mapping East to West'On War' -- Carl Von Clausewitz 1780 -1831 A.D.; 'The Art of War' -- Sun Tzu 544 -- 496 B.C.; Principles of Chinese Cyberwarfare -中国网络战的原则; The PLA's 制信息权 Information Dominance; Chinese Information War Theory and Implementation; Stratagems when in a superior position; Stratagems for confrontation; Stratagems for attack; Stratagems for attack; Stratagems for gaining cyberground; Stratagems for desperate situations; Chapter 5: Nature of Information warfare; Information Warfare; The IW Impact on Combat Concepts; The IW Impact on Organizational Structure. 
938 |a Books 24x7  |b B247  |n bks00056001 
938 |a EBL - Ebook Library  |b EBLB  |n EBL918805 
938 |a EBSCOhost  |b EBSC  |n 571552 
938 |a YBP Library Services  |b YANK  |n 9241857 
994 |a 92  |b IZTAP