|
|
|
|
LEADER |
03474nam a2200553 4500 |
001 |
978-3-319-68436-9 |
003 |
DE-He213 |
005 |
20191220125313.0 |
007 |
cr nn 008mamaa |
008 |
180515s2018 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319684369
|9 978-3-319-68436-9
|
024 |
7 |
|
|a 10.1007/978-3-319-68436-9
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.M3
|
072 |
|
7 |
|a UYZM
|2 bicssc
|
072 |
|
7 |
|a BUS083000
|2 bisacsh
|
072 |
|
7 |
|a UYZM
|2 thema
|
072 |
|
7 |
|a UKR
|2 thema
|
082 |
0 |
4 |
|a 005.74
|2 23
|
100 |
1 |
|
|a Austin, Greg.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Cybersecurity in China
|h [electronic resource] :
|b The Next Wave /
|c by Greg Austin.
|
250 |
|
|
|a 1st ed. 2018.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2018.
|
300 |
|
|
|a XXI, 130 p. 1 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a SpringerBriefs in Cybersecurity,
|x 2193-973X
|
505 |
0 |
|
|a Preface -- The Cybersecurity Ecosystem -- Education in Cyber Security- Chinese Views of the Cyber Industrial Complex -- Corporate Cyber Security -- Cyber Insecurity.of Chinese Citizens- Governmental Cybersecurity -- Grading National Cybersecurity -- The Next Wave.
|
520 |
|
|
|a This book offers the first benchmarking study of China's response to the problems of security in cyber space. There are several useful descriptive books on cyber security policy in China published between 2010 and 2016. As a result, we know quite well the system for managing cyber security in China, and the history of policy responses. What we don't know so well, and where this book is useful, is how capable China has become in this domain relative to the rest of the world. This book is a health check, a report card, on China's cyber security system in the face of escalating threats from criminal gangs and hostile states. The book also offers an assessment of the effectiveness of China's efforts. It lays out the major gaps and shortcomings in China's cyber security policy. It is the first book to base itself around an assessment of China's cyber industrial complex, concluding that China does not yet have one. As Xi Jinping said in July 2016, the country's core technologies are dominated by foreigners.
|
650 |
|
0 |
|a Management information systems.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Public policy.
|
650 |
|
0 |
|a International criminal law.
|
650 |
|
0 |
|a Electronics.
|
650 |
|
0 |
|a Microelectronics.
|
650 |
1 |
4 |
|a Management of Computing and Information Systems.
|0 http://scigraph.springernature.com/things/product-market-codes/I24067
|
650 |
2 |
4 |
|a Public Policy.
|0 http://scigraph.springernature.com/things/product-market-codes/911060
|
650 |
2 |
4 |
|a International Criminal Law .
|0 http://scigraph.springernature.com/things/product-market-codes/R19040
|
650 |
2 |
4 |
|a Electronics and Microelectronics, Instrumentation.
|0 http://scigraph.springernature.com/things/product-market-codes/T24027
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319684352
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319684376
|
830 |
|
0 |
|a SpringerBriefs in Cybersecurity,
|x 2193-973X
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-319-68436-9
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
950 |
|
|
|a Computer Science (Springer-11645)
|