China and cybersecurity: espionage, strategy, and politics in the digital domain
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Oxford [u.a.]
Oxford Univ. Press
2015
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XVII, 375 S. Ill., graph. Darst., Kt. |
ISBN: | 9780190201265 9780190201272 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV042396456 | ||
003 | DE-604 | ||
005 | 20160822 | ||
007 | t | ||
008 | 150309s2015 abd| |||| 00||| eng d | ||
020 | |a 9780190201265 |c hbk |9 978-0-19-020126-5 | ||
020 | |a 9780190201272 |c pbk |9 978-0-19-020127-2 | ||
035 | |a (OCoLC)909917385 | ||
035 | |a (DE-599)BVBBV042396456 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-473 |a DE-12 |a DE-M382 |a DE-188 |a DE-20 | ||
084 | |a MH 50950 |0 (DE-625)122902:12227 |2 rvk | ||
245 | 1 | 0 | |a China and cybersecurity |b espionage, strategy, and politics in the digital domain |c ed. by Jon R. Lindsay ... |
264 | 1 | |a Oxford [u.a.] |b Oxford Univ. Press |c 2015 | |
300 | |a XVII, 375 S. |b Ill., graph. Darst., Kt. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Ausspähen von Daten |0 (DE-588)7714184-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
651 | 7 | |a China |0 (DE-588)4009937-4 |2 gnd |9 rswk-swf | |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a China |0 (DE-588)4009937-4 |D g |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Ausspähen von Daten |0 (DE-588)7714184-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Lindsay, Jon R. |e Sonstige |0 (DE-588)1109925948 |4 oth | |
856 | 4 | 2 | |m Digitalisierung UB Bamberg - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027832231&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-027832231 | ||
942 | 1 | 1 | |c 609 |e 22/bsb |f 090512 |g 51 |
942 | 1 | 1 | |c 355.009 |e 22/bsb |f 090512 |g 51 |
942 | 1 | 1 | |c 909 |e 22/bsb |f 090512 |g 51 |
Datensatz im Suchindex
_version_ | 1804153048687181824 |
---|---|
adam_text | CONTENTS
Acknowledgments
vii
Contributors
ix
Abbreviations
xv
1.
Introduction
—
China and Cybersecurity: Controversy
and Context
1
Jon R. Lindsay
PART I: Espionage and Cybercrime
2.
lhe
Chinese Intelligence Agencies: Evolution and
Empowerment in Cyberspace
29
Nigel Inkster
3.
From Exploitation to Innovation: Acquisition, Absorption,
and Application
51
Jon R. Lindsay and
Tai
Ming Cheung
4.
Investigating the Chinese Online Underground Economy
87
Zhuge Jianwei, Gu Lion, Duan Haixin, and Taylor Roberts
PART II: Military Strategy and Institutions
5.
From
Cyberwarfare
to Cybersecurity in the
Asia-Pacific and Beyond
123
Ye Zheng
6.
Chinese Writings on
Cyberwarfare
and Coercion
138
Kevin
Pottpeter
7.
The Chinese People s Liberation Army Computer Network
Operations Infrastructure
263
Mark A. Stokes
8.
Civil-Military Integration and Cybersecurity: A Study of Chinese
Information Warfare Militias
188
Robert Sheldon and Joe McReynolds
PART III: National Cybersecurity Policy
9.
China s Cybersecurity Situation and the Potential for
International Cooperation
225
Li Yuxiao andXu
Lu
10.
Evolving Legal Frameworks for Protecting the Right to Internet
Privacy in China
242
Xu Jinghong
11.
Foreign Hostile Forces : The Human Rights Dimension of China s
Cyber Campaigns
260
Sarah McKune
PART IV: Practical and Theoretical Implications
12.
China and Information Security Threats: Policy Responses
in the United States
297
Fred H.
Cate
13.
Conclusion: The Rise of China and the Future of
Cybersecurity
333
Jon R. Lindsay and Derek S. Reveron
Index
355
|
any_adam_object | 1 |
author_GND | (DE-588)1109925948 |
building | Verbundindex |
bvnumber | BV042396456 |
classification_rvk | MH 50950 |
ctrlnum | (OCoLC)909917385 (DE-599)BVBBV042396456 |
discipline | Politologie |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01800nam a2200421 c 4500</leader><controlfield tag="001">BV042396456</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160822 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">150309s2015 abd| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780190201265</subfield><subfield code="c">hbk</subfield><subfield code="9">978-0-19-020126-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780190201272</subfield><subfield code="c">pbk</subfield><subfield code="9">978-0-19-020127-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)909917385</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042396456</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-12</subfield><subfield code="a">DE-M382</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-20</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MH 50950</subfield><subfield code="0">(DE-625)122902:12227</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">China and cybersecurity</subfield><subfield code="b">espionage, strategy, and politics in the digital domain</subfield><subfield code="c">ed. by Jon R. Lindsay ...</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Oxford [u.a.]</subfield><subfield code="b">Oxford Univ. Press</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVII, 375 S.</subfield><subfield code="b">Ill., graph. Darst., Kt.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Ausspähen von Daten</subfield><subfield code="0">(DE-588)7714184-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">China</subfield><subfield code="0">(DE-588)4009937-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">China</subfield><subfield code="0">(DE-588)4009937-4</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Ausspähen von Daten</subfield><subfield code="0">(DE-588)7714184-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lindsay, Jon R.</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1109925948</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bamberg - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027832231&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027832231</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">609</subfield><subfield code="e">22/bsb</subfield><subfield code="f">090512</subfield><subfield code="g">51</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">355.009</subfield><subfield code="e">22/bsb</subfield><subfield code="f">090512</subfield><subfield code="g">51</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">909</subfield><subfield code="e">22/bsb</subfield><subfield code="f">090512</subfield><subfield code="g">51</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
geographic | China (DE-588)4009937-4 gnd |
geographic_facet | China |
id | DE-604.BV042396456 |
illustrated | Illustrated |
indexdate | 2024-07-10T01:20:25Z |
institution | BVB |
isbn | 9780190201265 9780190201272 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027832231 |
oclc_num | 909917385 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-12 DE-M382 DE-188 DE-20 |
owner_facet | DE-473 DE-BY-UBG DE-12 DE-M382 DE-188 DE-20 |
physical | XVII, 375 S. Ill., graph. Darst., Kt. |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Oxford Univ. Press |
record_format | marc |
spelling | China and cybersecurity espionage, strategy, and politics in the digital domain ed. by Jon R. Lindsay ... Oxford [u.a.] Oxford Univ. Press 2015 XVII, 375 S. Ill., graph. Darst., Kt. txt rdacontent n rdamedia nc rdacarrier Ausspähen von Daten (DE-588)7714184-2 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf China (DE-588)4009937-4 gnd rswk-swf (DE-588)4143413-4 Aufsatzsammlung gnd-content China (DE-588)4009937-4 g Computersicherheit (DE-588)4274324-2 s Ausspähen von Daten (DE-588)7714184-2 s DE-604 Lindsay, Jon R. Sonstige (DE-588)1109925948 oth Digitalisierung UB Bamberg - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027832231&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | China and cybersecurity espionage, strategy, and politics in the digital domain Ausspähen von Daten (DE-588)7714184-2 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)7714184-2 (DE-588)4274324-2 (DE-588)4009937-4 (DE-588)4143413-4 |
title | China and cybersecurity espionage, strategy, and politics in the digital domain |
title_auth | China and cybersecurity espionage, strategy, and politics in the digital domain |
title_exact_search | China and cybersecurity espionage, strategy, and politics in the digital domain |
title_full | China and cybersecurity espionage, strategy, and politics in the digital domain ed. by Jon R. Lindsay ... |
title_fullStr | China and cybersecurity espionage, strategy, and politics in the digital domain ed. by Jon R. Lindsay ... |
title_full_unstemmed | China and cybersecurity espionage, strategy, and politics in the digital domain ed. by Jon R. Lindsay ... |
title_short | China and cybersecurity |
title_sort | china and cybersecurity espionage strategy and politics in the digital domain |
title_sub | espionage, strategy, and politics in the digital domain |
topic | Ausspähen von Daten (DE-588)7714184-2 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Ausspähen von Daten Computersicherheit China Aufsatzsammlung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027832231&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT lindsayjonr chinaandcybersecurityespionagestrategyandpoliticsinthedigitaldomain |