|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
JSTOR_ocn799769050 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
121121s2012 enka ob 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d YDXCP
|d OCLCQ
|d DOS
|d N$T
|d UMI
|d B24X7
|d COO
|d DEBSZ
|d JSTOR
|d OCLCA
|d OCLCQ
|d OCLCO
|d NMC
|d VT2
|d S9I
|d UPM
|d OCLCQ
|d JBG
|d AGLDB
|d LIV
|d MERUC
|d OCLCQ
|d CUS
|d IOG
|d IYU
|d OCLCF
|d VNS
|d VTS
|d CEF
|d OCLCQ
|d WYU
|d LVT
|d TSC
|d STF
|d UAB
|d OCLCQ
|d VLY
|d UX1
|d OCLCO
|d OCLCQ
|
066 |
|
|
|c $1
|
019 |
|
|
|a 857716883
|a 884544873
|a 894391170
|a 1087379235
|a 1162478981
|a 1175634243
|
020 |
|
|
|a 9781849283359
|q (electronic bk.)
|
020 |
|
|
|a 1849283354
|q (electronic bk.)
|
020 |
|
|
|a 9781849283663
|
020 |
|
|
|a 1849283664
|
020 |
|
|
|z 1849283346
|
020 |
|
|
|z 9781849283342
|
020 |
|
|
|a 1299468411
|
020 |
|
|
|a 9781299468412
|
029 |
1 |
|
|a AU@
|b 000052006211
|
029 |
1 |
|
|a DEBBG
|b BV041432049
|
029 |
1 |
|
|a DEBBG
|b BV043082376
|
029 |
1 |
|
|a DEBSZ
|b 39827939X
|
029 |
1 |
|
|a DEBSZ
|b 421257687
|
029 |
1 |
|
|a DEBSZ
|b 431143692
|
029 |
1 |
|
|a DEBSZ
|b 449303292
|
029 |
1 |
|
|a GBVCP
|b 785370803
|
035 |
|
|
|a (OCoLC)799769050
|z (OCoLC)857716883
|z (OCoLC)884544873
|z (OCoLC)894391170
|z (OCoLC)1087379235
|z (OCoLC)1162478981
|z (OCoLC)1175634243
|
037 |
|
|
|a CL0500000277
|b Safari Books Online
|
037 |
|
|
|a 22573/ctt4k5hnq
|b JSTOR
|
043 |
|
|
|a a-cc---
|
050 |
|
4 |
|a HV6773.15.C97
|b H34 2012eb online
|
072 |
|
7 |
|a COM
|x 032000
|2 bisacsh
|
072 |
|
7 |
|a COM000000
|2 bisacsh
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
1 |
4 |
|a 303.48
|a 303.48/33
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Hagestad, William T.,
|c II,
|e author.
|
245 |
1 |
0 |
|a 21st century Chinese cyberwarfare :
|b an examination of the Chinese cyberthreat from fundamentals of Communist policy regarding information warfare through the broad range of military, civilian and commercially supported cyberattack threat vectors /
|c William T. Hagestad II.
|
246 |
3 |
|
|a Twenty-first century Chinese cyberwarfare
|
260 |
|
|
|a Ely, Cambridgeshire, United Kingdom :
|b IT Governance Publishing,
|c 2012.
|
300 |
|
|
|a 1 online resource (349 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
504 |
|
|
|a Includes bibliographical references.
|
505 |
0 |
|
|a The Chinese cyberthreat -- Evolution of Chinese cyberwarfare -- Chinese unrestricted warfare -- Principles of warfare : West versus East -- Nature of information warfare -- Chinese cyberwarfare doctrines -- China's SIGINT capabilities -- Chinese IW capabilities -- The Chinese IW organizational structure -- Chinese commercial enterprises -- Commercial objectives of Chinese cyberattacks -- Chinese civilian hackers -- The Chinese cyberthreat : conclusions.
|
520 |
|
|
|a 21st Century Chinese Cyberwarfare draws from a combination of business, cultural, historical, linguistic and the author's personal experience to attempt to explain China to the uninitiated. The objective of the book is to raise awareness of the fact that the People's Republic of China is using a combination of their unique culture, language, and political will, known as Chinese Communism, to maintain their cultural heritage.
|
546 |
|
|
|a English.
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Evidence Based Acquisitions
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
650 |
|
0 |
|a Cyberterrorism
|x Government policy
|z China.
|
650 |
|
0 |
|a Information warfare
|x Government policy
|z China.
|
650 |
|
0 |
|a Cyberspace
|x Government policy
|z China.
|
650 |
|
0 |
|a Hackers
|x Government policy
|z China.
|
650 |
|
0 |
|a Information warfare
|z China.
|
650 |
|
0 |
|a Internet
|x Political aspects
|z China.
|
650 |
|
0 |
|a Internet
|x Social aspects
|z China.
|
650 |
|
6 |
|a Cyberterrorisme
|x Politique gouvernementale
|z Chine.
|
650 |
|
6 |
|a Guerre de l'information
|x Politique gouvernementale
|z Chine.
|
650 |
|
6 |
|a Cyberespace
|x Politique gouvernementale
|z Chine.
|
650 |
|
6 |
|a Pirates informatiques
|x Politique gouvernementale
|z Chine.
|
650 |
|
6 |
|a Guerre de l'information
|z Chine.
|
650 |
|
6 |
|a Internet
|x Aspect politique
|z Chine.
|
650 |
|
6 |
|a Internet
|x Aspect social
|z Chine.
|
650 |
|
7 |
|a COMPUTERS
|x Information Technology.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Cyberspace
|x Government policy.
|2 fast
|0 (OCoLC)fst00885796
|
650 |
|
7 |
|a Information warfare.
|2 fast
|0 (OCoLC)fst00973186
|
650 |
|
7 |
|a Internet
|x Political aspects.
|2 fast
|0 (OCoLC)fst00977197
|
650 |
|
7 |
|a Internet
|x Social aspects.
|2 fast
|0 (OCoLC)fst01766793
|
651 |
|
7 |
|a China.
|2 fast
|0 (OCoLC)fst01206073
|
776 |
0 |
8 |
|i Print version:
|a Hagestad, William T., II.
|t 21st century Chinese cyberwarfare.
|d Cambridgeshire [England] : IT Governance Pub., 2012
|z 9781849283342
|w (OCoLC)769420458
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.2307/j.ctt5hh5nz
|z Texto completo
|
880 |
8 |
|
|6 505-00/$1
|a Rules of Engagement: PLA's Information Dominance chapter 7: China's SIGINT Capabilities; China and information warfare (IW): Signals Intelligence (SIGINT), Electronic Warfare (EW) and Cyberwarfare (CW); The PLA SIGINT ground stations; Airborne SIGINT capabilities; Chinese Naval SIGINT Activities; Chinese PLA Electronic warfare; Airborne EW systems; Chapter 8: Chinese IW Capabilities; Assessing China's IW Capabilities; Chapter 9: The Chinese IW Organizational Structure; Key PLA Departments: Integrated Network Electronic Warfare (INEW); General Staff Department Third Department总参三部.
|
880 |
8 |
|
|6 505-00/$1
|a Warfare -- Mapping East to West'On War' -- Carl Von Clausewitz 1780 -1831 A.D.; 'The Art of War' -- Sun Tzu 544 -- 496 B.C.; Principles of Chinese Cyberwarfare -中国网络战的原则; The PLA's 制信息权 Information Dominance; Chinese Information War Theory and Implementation; Stratagems when in a superior position; Stratagems for confrontation; Stratagems for attack; Stratagems for attack; Stratagems for gaining cyberground; Stratagems for desperate situations; Chapter 5: Nature of Information warfare; Information Warfare; The IW Impact on Combat Concepts; The IW Impact on Organizational Structure.
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00056001
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL918805
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 571552
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 9241857
|
994 |
|
|
|a 92
|b IZTAP
|