|
|
|
|
LEADER |
06146nam a2200817 4500 |
001 |
ocn891396804 |
003 |
OCoLC |
005 |
20170124071558.7 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
140822t20142014enk ob 001 0 eng d |
040 |
|
|
|a E7B
|b eng
|e rda
|e pn
|c E7B
|d OCLCO
|d B24X7
|d OTZ
|d COO
|d OCLCQ
|d OCLCO
|d OCLCF
|d OCLCO
|d VT2
|d EBLCP
|d IDEBK
|d DG1
|d N$T
|d CDX
|d YDXCP
|d RECBK
|d DEBSZ
|d CUS
|d COH
|d OCLCO
|d DEBBG
|d OCLCQ
|d OCLCO
|d OCLCQ
|d GrThAP
|
019 |
|
|
|a 887507222
|a 896605789
|a 961536678
|a 962561903
|
020 |
|
|
|a 9781119009016
|q (e-book)
|
020 |
|
|
|a 1119009014
|q (e-book)
|
020 |
|
|
|a 9781119009009
|
020 |
|
|
|a 1119009006
|
020 |
|
|
|a 1118814843
|
020 |
|
|
|a 9781118814840
|
020 |
|
|
|a 1118816102
|
020 |
|
|
|a 9781118816103
|
020 |
|
|
|a 1119009138
|
020 |
|
|
|a 9781119009139
|
020 |
|
|
|a 9781322060811
|
020 |
|
|
|a 1322060819
|
020 |
|
|
|z 9781848216143
|
020 |
|
|
|z 1848216149
|
029 |
1 |
|
|a CHBIS
|b 010259764
|
029 |
1 |
|
|a CHNEW
|b 000667522
|
029 |
1 |
|
|a CHNEW
|b 000688007
|
029 |
1 |
|
|a CHNEW
|b 000688008
|
029 |
1 |
|
|a CHVBK
|b 325942994
|
029 |
1 |
|
|a DEBBG
|b BV043397057
|
029 |
1 |
|
|a DEBSZ
|b 431746117
|
029 |
1 |
|
|a NLGGC
|b 381948765
|
029 |
1 |
|
|a NZ1
|b 15908970
|
035 |
|
|
|a (OCoLC)891396804
|z (OCoLC)887507222
|z (OCoLC)896605789
|z (OCoLC)961536678
|z (OCoLC)962561903
|
037 |
|
|
|a 637332
|b MIL
|
043 |
|
|
|a a-cc---
|a a------
|
050 |
|
4 |
|a QA76.9.A25
|b .C456 2014eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a MAIN
|
245 |
0 |
0 |
|a Chinese cybersecurity and defense /
|c edited by Daniel Ventre.
|
264 |
|
1 |
|a London [England] ;
|a Hoboken, New Jersey :
|b ISTE :
|b Wiley,
|c 2014.
|
264 |
|
4 |
|c ©2014
|
300 |
|
|
|a 1 online resource (321 pages).
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Information Systems, Web and Pervasive Computing Series
|
500 |
|
|
|a Includes index.
|
588 |
0 |
|
|a Print version record.
|
520 |
|
|
|a "The aim of this book is to analyze China's policies, strategies and practices in the area of cybersecurity and cyberdefense; and also to analyze the effect they have on the political and strategic choices made by other states. Contributions to this work have come from seven researchers, specializing in international relations and issues of cybersecurity. The individual chapters are drawn from a conference which took place in Paris, on 1 July 2013, organized by the Chair of Cyberdefense and Cybersecurity (Saint-Cyr / Sogeti / Thales)."--
|c Unedited summary from book.
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Cover; Title Page; Copyright; Contents; Author Biographies; Introduction; Chapter 1: China's Internet Development and Cybersecurity -- Policies and Practices; 1.1. Introduction; 1.2. Internet development in China: an overview; 1.3. China's policies towards Internet development; 1.3.1. From the very beginning of its development, China's Internet has been closely linked to the Chineseeconomy, and was programmed and integrated into itsmacro economic development blueprints.
|
505 |
8 |
|
|a 1.3.2. In addition to lending full policy support toInternet development, China also invests heavily inbuilding Internet infrastructures1.3.3. The Chinese government actively promotes theR & D of next-generation Internet (NGI); 1.3.4. China practices a policy of managing cyberaffairs in line with law, adhering to the principles ofscientific and effective administration in its Internetgovernance; 1.4. Cyber legislation and Internet administration; 1.4.1. Basic principles and practices of Internetadministration in China; 1.4.1.1. Laws and regulations on Internet administration.
|
505 |
8 |
|
|a 1.4.1.2. The leading role of the Chinese government in Internet administration1.4.1.3. Industry self-regulation; 1.4.1.4. Public supervision through special websites; 1.4.2. Guaranteeing the free and secure flow ofinformation in cyberspace; 1.4.2.1. Guaranteeing Citizens' Freedom of Speech on the Internet; 1.4.2.1.1. Constitutional guarantee; 1.4.2.1.2. Public supervision via the Internet; 1.4.2.1.3. CCDI website for public supervision; 1.4.2.1.4. Protecting citizens' online privacy; 1.4.2.1.5. Guaranteeing online safety for minors; 1.4.2.2. Protecting Internet Security.
|
505 |
8 |
|
|a 1.5. Cybersecurity and diplomacy: an international perspective1.5.1. Cyber policy dialogue and consultation; 1.5.2. Regional cyber cooperation; 1.5.3. Track II cyber diplomacy; 1.5.4. Legal cooperation in combating cybercrimes; 1.5.5. Technical cooperation; 1.5.5.1. CNCERT; 1.5.5.2. CNNIC; 1.5.5.3. ISC; 1.5.6. Office for Cyber Affairs of the MFA; 1.6. A cybersecurity strategy in the making?; 1.6.1. Significance of the Internet for China; 1.6.2. Goals and objectives; 1.6.3. Cyber threat landscape; 1.6.4. Means for strategic goals; 1.7. Conclusion.
|
505 |
8 |
|
|a Chapter 2: PLA Views on Informationized Warfare, Information Warfare and Information Operations2.1. The evolution of chinese military thinking; 2.2. The growing importance of information; 2.3. Information operations; 2.3.1. Command and control missions; 2.3.2. Offensive information missions; 2.3.2.1. Information coercion/information deterrence; 2.3.2.2. Information blockade; 2.3.2.3. Information misdirection; 2.3.2.4. Information contamination; 2.3.2.5. Information paralysis; 2.3.3. Defensive information missions; 2.3.4. Information support and safeguarding missions.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Internet
|x Security measures.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Internet
|x Security measures.
|2 fast
|0 (OCoLC)fst01751426
|
655 |
|
4 |
|a Electronic books.
|
700 |
1 |
|
|a Ventre, Daniel,
|e editor.
|
776 |
0 |
8 |
|i Print version:
|t Chinese cybersecurity and defense.
|d London, [England] ; Hoboken, New Jersey : ISTE : Wiley, ©2014
|h xviii, 301 pages
|z 9781848216143
|
830 |
|
0 |
|a Information systems, web and pervasive computing series.
|
856 |
4 |
0 |
|u https://doi.org/10.1002/9781119009009
|z Full Text via HEAL-Link
|
994 |
|
|
|a 92
|b DG1
|