21st century Chinese cyberwarfare : an examination of the Chinese cyberthreat from fundamentals of Communist policy regarding information warfare through the broad range of military, civilian and commercially supported cyberattack threat vectors / William T. Hagestad II.
21st Century Chinese Cyberwarfare draws from a combination of business, cultural, historical, linguistic and the author's personal experience to attempt to explain China to the uninitiated. The objective of the book is to raise awareness of the fact that the People's Republic of China is u...
Saved in:
Online Access: |
Full Text (via O'Reilly/Safari) |
---|---|
Main Author: | |
Other title: | Twenty-first century Chinese cyberwarfare |
Format: | eBook |
Language: | English |
Published: |
Ely, Cambridgeshire, United Kingdom :
IT Governance Publishing,
2012.
|
Subjects: |
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | b10284423 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 121121s2012 enka ob 000 0 eng d | ||
005 | 20240829144256.4 | ||
019 | |a 857716883 |a 884544873 |a 894391170 |a 1087379235 |a 1162478981 |a 1175634243 | ||
020 | |a 9781849283359 |q (electronic bk.) | ||
020 | |a 1849283354 |q (electronic bk.) | ||
020 | |a 9781849283663 | ||
020 | |a 1849283664 | ||
020 | |z 1849283346 | ||
020 | |z 9781849283342 | ||
020 | |a 1299468411 | ||
020 | |a 9781299468412 | ||
029 | 1 | |a AU@ |b 000052006211 | |
029 | 1 | |a DEBBG |b BV041432049 | |
029 | 1 | |a DEBBG |b BV043082376 | |
029 | 1 | |a DEBSZ |b 39827939X | |
029 | 1 | |a DEBSZ |b 421257687 | |
029 | 1 | |a DEBSZ |b 431143692 | |
029 | 1 | |a DEBSZ |b 449303292 | |
029 | 1 | |a GBVCP |b 785370803 | |
035 | |a (OCoLC)safo799769050 | ||
035 | |a (OCoLC)799769050 |z (OCoLC)857716883 |z (OCoLC)884544873 |z (OCoLC)894391170 |z (OCoLC)1087379235 |z (OCoLC)1162478981 |z (OCoLC)1175634243 | ||
037 | |a safo9781849283663 | ||
040 | |a EBLCP |b eng |e pn |c EBLCP |d YDXCP |d OCLCQ |d DOS |d N$T |d UMI |d B24X7 |d COO |d DEBSZ |d JSTOR |d OCLCA |d OCLCQ |d OCLCO |d NMC |d VT2 |d S9I |d UPM |d OCLCQ |d JBG |d AGLDB |d LIV |d MERUC |d OCLCQ |d CUS |d IOG |d IYU |d OCLCF |d VNS |d VTS |d CEF |d OCLCQ |d WYU |d LVT |d TSC |d STF |d UAB |d OCLCQ |d VLY |d UX1 |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d OCLCQ | ||
043 | |a a-cc--- | ||
049 | |a GWRE | ||
050 | 4 | |a HV6773.15.C97 |b H34 2012eb online | |
066 | |c $1 | ||
100 | 1 | |a Hagestad, William T., |c II, |e author. | |
245 | 1 | 0 | |a 21st century Chinese cyberwarfare : |b an examination of the Chinese cyberthreat from fundamentals of Communist policy regarding information warfare through the broad range of military, civilian and commercially supported cyberattack threat vectors / |c William T. Hagestad II. |
246 | 3 | |a Twenty-first century Chinese cyberwarfare | |
260 | |a Ely, Cambridgeshire, United Kingdom : |b IT Governance Publishing, |c 2012. | ||
300 | |a 1 online resource (349 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a volume |b nc |2 rdacarrier | ||
588 | 0 | |a Print version record. | |
504 | |a Includes bibliographical references. | ||
505 | 0 | |a The Chinese cyberthreat -- Evolution of Chinese cyberwarfare -- Chinese unrestricted warfare -- Principles of warfare : West versus East -- Nature of information warfare -- Chinese cyberwarfare doctrines -- China's SIGINT capabilities -- Chinese IW capabilities -- The Chinese IW organizational structure -- Chinese commercial enterprises -- Commercial objectives of Chinese cyberattacks -- Chinese civilian hackers -- The Chinese cyberthreat : conclusions. | |
520 | |a 21st Century Chinese Cyberwarfare draws from a combination of business, cultural, historical, linguistic and the author's personal experience to attempt to explain China to the uninitiated. The objective of the book is to raise awareness of the fact that the People's Republic of China is using a combination of their unique culture, language, and political will, known as Chinese Communism, to maintain their cultural heritage. | ||
546 | |a English. | ||
650 | 0 | |a Cyberterrorism |x Government policy |z China. | |
650 | 0 | |a Information warfare |x Government policy |z China. | |
650 | 0 | |a Cyberspace |x Government policy |z China. | |
650 | 0 | |a Hackers |x Government policy |z China. | |
650 | 0 | |a Information warfare |z China. | |
650 | 0 | |a Internet |x Political aspects |z China. | |
650 | 0 | |a Internet |x Social aspects |z China. | |
650 | 7 | |a Cyberspace |x Government policy |2 fast | |
650 | 7 | |a Information warfare |2 fast | |
650 | 7 | |a Internet |x Political aspects |2 fast | |
650 | 7 | |a Internet |x Social aspects |2 fast | |
651 | 7 | |a China |2 fast |1 https://id.oclc.org/worldcat/entity/E39PBJdCqh8h6hJY7PT6MQW4bd | |
776 | 0 | 8 | |i Print version: |a Hagestad, William T., II. |t 21st century Chinese cyberwarfare. |d Cambridgeshire [England] : IT Governance Pub., 2012 |z 9781849283342 |w (OCoLC)769420458 |
856 | 4 | 0 | |u https://go.oreilly.com/UniOfColoradoBoulder/library/view/~/9781849283663/?ar |z Full Text (via O'Reilly/Safari) |
880 | 8 | |6 505-00/$1 |a Rules of Engagement: PLA's Information Dominance chapter 7: China's SIGINT Capabilities; China and information warfare (IW): Signals Intelligence (SIGINT), Electronic Warfare (EW) and Cyberwarfare (CW); The PLA SIGINT ground stations; Airborne SIGINT capabilities; Chinese Naval SIGINT Activities; Chinese PLA Electronic warfare; Airborne EW systems; Chapter 8: Chinese IW Capabilities; Assessing China's IW Capabilities; Chapter 9: The Chinese IW Organizational Structure; Key PLA Departments: Integrated Network Electronic Warfare (INEW); General Staff Department Third Department总参三部. | |
880 | 8 | |6 505-00/$1 |a Warfare -- Mapping East to West'On War' -- Carl Von Clausewitz 1780 -1831 A.D.; 'The Art of War' -- Sun Tzu 544 -- 496 B.C.; Principles of Chinese Cyberwarfare -中国网络战的原则; The PLA's 制信息权 Information Dominance; Chinese Information War Theory and Implementation; Stratagems when in a superior position; Stratagems for confrontation; Stratagems for attack; Stratagems for attack; Stratagems for gaining cyberground; Stratagems for desperate situations; Chapter 5: Nature of Information warfare; Information Warfare; The IW Impact on Combat Concepts; The IW Impact on Organizational Structure. | |
915 | |a - | ||
956 | |a O'Reilly-Safari eBooks | ||
956 | |b O'Reilly Online Learning: Academic/Public Library Edition | ||
994 | |a 92 |b COD | ||
998 | |b Subsequent record output | ||
999 | f | f | |i 75a6485a-2e81-5ab1-81de-905b01d696d0 |s 19112f0c-442e-5ea2-9107-c48862c37653 |
952 | f | f | |p Can circulate |a University of Colorado Boulder |b Online |c Online |d Online |e HV6773.15.C97 H34 2012eb online |h Library of Congress classification |i web |n 1 |