Cargando…

Chinese cybersecurity and defense /

"The aim of this book is to analyze China's policies, strategies and practices in the area of cybersecurity and cyberdefense; and also to analyze the effect they have on the political and strategic choices made by other states. Contributions to this work have come from seven researchers, s...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Ventre, Daniel (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: London [England] ; Hoboken, New Jersey : ISTE : Wiley, 2014.
Colección:Information systems, web and pervasive computing series.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBOOKCENTRAL_ocn891396804
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cn|||||||||
008 140822t20142014enk ob 001 0 eng d
040 |a E7B  |b eng  |e rda  |e pn  |c E7B  |d OCLCO  |d B24X7  |d OTZ  |d COO  |d OCLCQ  |d OCLCO  |d OCLCF  |d OCLCO  |d VT2  |d EBLCP  |d IDEBK  |d DG1  |d N$T  |d CDX  |d YDXCP  |d RECBK  |d DEBSZ  |d CUS  |d COH  |d OCLCO  |d DEBBG  |d OCLCQ  |d OCLCO  |d OCLCQ  |d COCUF  |d DG1  |d CNNOR  |d LIP  |d PIFBY  |d ZCU  |d LIV  |d MERUC  |d OCLCQ  |d U3W  |d OCLCA  |d OCLCQ  |d STF  |d ICG  |d INT  |d OCLCQ  |d G3B  |d TKN  |d OCLCQ  |d DKC  |d OCLCQ  |d UKAHL  |d OCLCQ  |d BRF  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 887507222  |a 896605789  |a 961536678  |a 962561903  |a 992885991  |a 1055357636  |a 1081221628  |a 1103274016  |a 1138959500  |a 1153000902  |a 1192345303  |a 1240525522 
020 |a 9781119009016  |q (e-book) 
020 |a 1119009014  |q (e-book) 
020 |a 9781119009009 
020 |a 1119009006 
020 |a 1118814843 
020 |a 9781118814840 
020 |a 1118816102 
020 |a 9781118816103 
020 |a 1119009138 
020 |a 9781119009139 
020 |a 9781322060811 
020 |a 1322060819 
020 |z 9781848216143 
020 |z 1848216149 
029 1 |a AU@  |b 000056007434 
029 1 |a AU@  |b 000059332903 
029 1 |a CHBIS  |b 010259764 
029 1 |a CHNEW  |b 000667522 
029 1 |a CHNEW  |b 000688007 
029 1 |a CHNEW  |b 000688008 
029 1 |a CHNEW  |b 000943576 
029 1 |a CHVBK  |b 480238014 
029 1 |a DEBBG  |b BV043397057 
029 1 |a DEBBG  |b BV044069865 
029 1 |a DEBSZ  |b 431746117 
029 1 |a DEBSZ  |b 485052407 
029 1 |a NLGGC  |b 381948765 
029 1 |a NZ1  |b 15908970 
035 |a (OCoLC)891396804  |z (OCoLC)887507222  |z (OCoLC)896605789  |z (OCoLC)961536678  |z (OCoLC)962561903  |z (OCoLC)992885991  |z (OCoLC)1055357636  |z (OCoLC)1081221628  |z (OCoLC)1103274016  |z (OCoLC)1138959500  |z (OCoLC)1153000902  |z (OCoLC)1192345303  |z (OCoLC)1240525522 
037 |a 637332  |b MIL 
043 |a a-cc---  |a a------ 
050 4 |a QA76.9.A25  |b .C456 2014eb 
072 7 |a COM  |x 060040  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
245 0 0 |a Chinese cybersecurity and defense /  |c edited by Daniel Ventre. 
264 1 |a London [England] ;  |a Hoboken, New Jersey :  |b ISTE :  |b Wiley,  |c 2014. 
264 4 |c ©2014 
300 |a 1 online resource (321 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Information Systems, Web and Pervasive Computing Series 
500 |a Includes index. 
588 0 |a Print version record. 
520 |a "The aim of this book is to analyze China's policies, strategies and practices in the area of cybersecurity and cyberdefense; and also to analyze the effect they have on the political and strategic choices made by other states. Contributions to this work have come from seven researchers, specializing in international relations and issues of cybersecurity. The individual chapters are drawn from a conference which took place in Paris, on 1 July 2013, organized by the Chair of Cyberdefense and Cybersecurity (Saint-Cyr / Sogeti / Thales)."--  |c Unedited summary from book 
504 |a Includes bibliographical references and index. 
505 0 |a Cover; Title Page; Copyright; Contents; Author Biographies; Introduction; Chapter 1: China's Internet Development and Cybersecurity -- Policies and Practices; 1.1. Introduction; 1.2. Internet development in China: an overview; 1.3. China's policies towards Internet development; 1.3.1. From the very beginning of its development, China's Internet has been closely linked to the Chineseeconomy, and was programmed and integrated into itsmacro economic development blueprints. 
505 8 |a 1.3.2. In addition to lending full policy support toInternet development, China also invests heavily inbuilding Internet infrastructures1.3.3. The Chinese government actively promotes the R & D of next-generation Internet (NGI); 1.3.4. China practices a policy of managing cyberaffairs in line with law, adhering to the principles ofscientific and effective administration in its Internetgovernance; 1.4. Cyber legislation and Internet administration; 1.4.1. Basic principles and practices of Internetadministration in China; 1.4.1.1. Laws and regulations on Internet administration. 
505 8 |a 1.4.1.2. The leading role of the Chinese government in Internet administration1.4.1.3. Industry self-regulation; 1.4.1.4. Public supervision through special websites; 1.4.2. Guaranteeing the free and secure flow ofinformation in cyberspace; 1.4.2.1. Guaranteeing Citizens' Freedom of Speech on the Internet; 1.4.2.1.1. Constitutional guarantee; 1.4.2.1.2. Public supervision via the Internet; 1.4.2.1.3. CCDI website for public supervision; 1.4.2.1.4. Protecting citizens' online privacy; 1.4.2.1.5. Guaranteeing online safety for minors; 1.4.2.2. Protecting Internet Security. 
505 8 |a 1.5. Cybersecurity and diplomacy: an international perspective1.5.1. Cyber policy dialogue and consultation; 1.5.2. Regional cyber cooperation; 1.5.3. Track II cyber diplomacy; 1.5.4. Legal cooperation in combating cybercrimes; 1.5.5. Technical cooperation; 1.5.5.1. CNCERT; 1.5.5.2. CNNIC; 1.5.5.3. ISC; 1.5.6. Office for Cyber Affairs of the MFA; 1.6. A cybersecurity strategy in the making?; 1.6.1. Significance of the Internet for China; 1.6.2. Goals and objectives; 1.6.3. Cyber threat landscape; 1.6.4. Means for strategic goals; 1.7. Conclusion. 
505 8 |a Chapter 2: PLA Views on Informationized Warfare, Information Warfare and Information Operations2.1. The evolution of chinese military thinking; 2.2. The growing importance of information; 2.3. Information operations; 2.3.1. Command and control missions; 2.3.2. Offensive information missions; 2.3.2.1. Information coercion/information deterrence; 2.3.2.2. Information blockade; 2.3.2.3. Information misdirection; 2.3.2.4. Information contamination; 2.3.2.5. Information paralysis; 2.3.3. Defensive information missions; 2.3.4. Information support and safeguarding missions. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Computer security. 
650 0 |a Internet  |x Security measures. 
650 6 |a Sécurité informatique. 
650 6 |a Internet  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a Computer security  |2 fast 
650 7 |a Internet  |x Security measures  |2 fast 
700 1 |a Ventre, Daniel,  |e editor. 
758 |i has work:  |a Chinese cybersecurity and defense (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGD8c7k6rtWXmDXdX9XrYK  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |t Chinese cybersecurity and defense.  |d London, [England] ; Hoboken, New Jersey : ISTE : Wiley, ©2014  |h xviii, 301 pages  |z 9781848216143 
830 0 |a Information systems, web and pervasive computing series. 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1765106  |z Texto completo 
936 |a BATCHLOAD 
938 |a Askews and Holts Library Services  |b ASKH  |n AH26968268 
938 |a Askews and Holts Library Services  |b ASKH  |n AH26953737 
938 |a Books 24x7  |b B247  |n bks00063491 
938 |a Coutts Information Services  |b COUT  |n 28863526 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL1765106 
938 |a ebrary  |b EBRY  |n ebr10907568 
938 |a EBSCOhost  |b EBSC  |n 829073 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis28863526 
938 |a Recorded Books, LLC  |b RECE  |n rbeEB00537148 
938 |a YBP Library Services  |b YANK  |n 12032141 
938 |a YBP Library Services  |b YANK  |n 12677957 
994 |a 92  |b IZTAP