China's evolving IT capabilities: cloud computing, network operations and cyber espionage
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York
Nova Publishers
[2014]
|
Schriftenreihe: | Computer science, technology and applications
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Print version record |
Beschreibung: | 1 online resource (168 pages) map (some color) |
ISBN: | 1629489352 1629489441 9781629489353 9781629489445 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043032896 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151120s2014 |||| o||u| ||||||eng d | ||
020 | |a 1629489352 |9 1-62948-935-2 | ||
020 | |a 1629489441 |9 1-62948-944-1 | ||
020 | |a 9781629489353 |9 978-1-62948-935-3 | ||
020 | |a 9781629489445 |9 978-1-62948-944-5 | ||
035 | |a (OCoLC)870994503 | ||
035 | |a (DE-599)BVBBV043032896 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 004.67/820951 |2 23 | |
245 | 1 | 0 | |a China's evolving IT capabilities |b cloud computing, network operations and cyber espionage |c Lucas Solorio, editor |
246 | 1 | 3 | |a China's evolving information technology capabilities |
264 | 1 | |a New York |b Nova Publishers |c [2014] | |
264 | 4 | |c © 2014 | |
300 | |a 1 online resource (168 pages) |b map (some color) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Computer science, technology and applications | |
500 | |a Print version record | ||
505 | 8 | |a Red cloud rising : cloud computing in China / Leigh Ann Ragland, Joseph Mcreynolds, Matthew Southerland, James Mulvenon -- Occupying the information high ground : Chinese capabilities for computer network operations and cyber espionage / Bryan Krekel, Patton Adams, George Bakos | |
650 | 7 | |a COMPUTERS / Computer Literacy |2 bisacsh | |
650 | 7 | |a COMPUTERS / Computer Science |2 bisacsh | |
650 | 7 | |a COMPUTERS / Data Processing |2 bisacsh | |
650 | 7 | |a COMPUTERS / Hardware / General |2 bisacsh | |
650 | 7 | |a COMPUTERS / Information Technology |2 bisacsh | |
650 | 7 | |a COMPUTERS / Machine Theory |2 bisacsh | |
650 | 7 | |a COMPUTERS / Reference |2 bisacsh | |
650 | 7 | |a Cloud computing |2 fast | |
650 | 7 | |a Computer networks / Management |2 fast | |
650 | 7 | |a Cyberinfrastructure |2 fast | |
650 | 7 | |a Information technology / Government policy |2 fast | |
650 | 7 | |a Information warfare |2 fast | |
650 | 7 | |a Telecommunication |2 fast | |
650 | 4 | |a Informatik | |
650 | 4 | |a Politik | |
650 | 4 | |a Cloud computing |z China | |
650 | 4 | |a Cyberinfrastructure |z China | |
650 | 4 | |a Information technology |x Government policy |z China | |
650 | 4 | |a Information warfare |z China | |
650 | 4 | |a Telecommunication |z China | |
650 | 4 | |a Computer networks |z China |x Management | |
700 | 1 | |a Solorio, Lucas |4 edt | |
700 | 1 | |a Ragland, Leigh Ann |e Sonstige |4 oth | |
700 | 1 | |a Krekel, Bryan A. |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a China's evolving IT capabilities |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=673629 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028457546 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=673629 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=673629 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175390547116032 |
---|---|
any_adam_object | |
author2 | Solorio, Lucas |
author2_role | edt |
author2_variant | l s ls |
author_facet | Solorio, Lucas |
building | Verbundindex |
bvnumber | BV043032896 |
collection | ZDB-4-EBA |
contents | Red cloud rising : cloud computing in China / Leigh Ann Ragland, Joseph Mcreynolds, Matthew Southerland, James Mulvenon -- Occupying the information high ground : Chinese capabilities for computer network operations and cyber espionage / Bryan Krekel, Patton Adams, George Bakos |
ctrlnum | (OCoLC)870994503 (DE-599)BVBBV043032896 |
dewey-full | 004.67/820951 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.67/820951 |
dewey-search | 004.67/820951 |
dewey-sort | 14.67 6820951 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03108nmm a2200697zc 4500</leader><controlfield tag="001">BV043032896</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151120s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1629489352</subfield><subfield code="9">1-62948-935-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1629489441</subfield><subfield code="9">1-62948-944-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781629489353</subfield><subfield code="9">978-1-62948-935-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781629489445</subfield><subfield code="9">978-1-62948-944-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)870994503</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043032896</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.67/820951</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">China's evolving IT capabilities</subfield><subfield code="b">cloud computing, network operations and cyber espionage</subfield><subfield code="c">Lucas Solorio, editor</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">China's evolving information technology capabilities</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York</subfield><subfield code="b">Nova Publishers</subfield><subfield code="c">[2014]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (168 pages)</subfield><subfield code="b">map (some color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Computer science, technology and applications</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Red cloud rising : cloud computing in China / Leigh Ann Ragland, Joseph Mcreynolds, Matthew Southerland, James Mulvenon -- Occupying the information high ground : Chinese capabilities for computer network operations and cyber espionage / Bryan Krekel, Patton Adams, George Bakos</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Computer Literacy</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Computer Science</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Data Processing</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Hardware / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Information Technology</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Machine Theory</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Reference</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cloud computing</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Management</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberinfrastructure</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information technology / Government policy</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information warfare</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Telecommunication</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Politik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud computing</subfield><subfield code="z">China</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberinfrastructure</subfield><subfield code="z">China</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield><subfield code="x">Government policy</subfield><subfield code="z">China</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information warfare</subfield><subfield code="z">China</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Telecommunication</subfield><subfield code="z">China</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="z">China</subfield><subfield code="x">Management</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Solorio, Lucas</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ragland, Leigh Ann</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Krekel, Bryan A.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">China's evolving IT capabilities</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=673629</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028457546</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=673629</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=673629</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043032896 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:15:32Z |
institution | BVB |
isbn | 1629489352 1629489441 9781629489353 9781629489445 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028457546 |
oclc_num | 870994503 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 online resource (168 pages) map (some color) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Nova Publishers |
record_format | marc |
series2 | Computer science, technology and applications |
spelling | China's evolving IT capabilities cloud computing, network operations and cyber espionage Lucas Solorio, editor China's evolving information technology capabilities New York Nova Publishers [2014] © 2014 1 online resource (168 pages) map (some color) txt rdacontent c rdamedia cr rdacarrier Computer science, technology and applications Print version record Red cloud rising : cloud computing in China / Leigh Ann Ragland, Joseph Mcreynolds, Matthew Southerland, James Mulvenon -- Occupying the information high ground : Chinese capabilities for computer network operations and cyber espionage / Bryan Krekel, Patton Adams, George Bakos COMPUTERS / Computer Literacy bisacsh COMPUTERS / Computer Science bisacsh COMPUTERS / Data Processing bisacsh COMPUTERS / Hardware / General bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Machine Theory bisacsh COMPUTERS / Reference bisacsh Cloud computing fast Computer networks / Management fast Cyberinfrastructure fast Information technology / Government policy fast Information warfare fast Telecommunication fast Informatik Politik Cloud computing China Cyberinfrastructure China Information technology Government policy China Information warfare China Telecommunication China Computer networks China Management Solorio, Lucas edt Ragland, Leigh Ann Sonstige oth Krekel, Bryan A. Sonstige oth Erscheint auch als Druck-Ausgabe China's evolving IT capabilities http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=673629 Aggregator Volltext |
spellingShingle | China's evolving IT capabilities cloud computing, network operations and cyber espionage Red cloud rising : cloud computing in China / Leigh Ann Ragland, Joseph Mcreynolds, Matthew Southerland, James Mulvenon -- Occupying the information high ground : Chinese capabilities for computer network operations and cyber espionage / Bryan Krekel, Patton Adams, George Bakos COMPUTERS / Computer Literacy bisacsh COMPUTERS / Computer Science bisacsh COMPUTERS / Data Processing bisacsh COMPUTERS / Hardware / General bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Machine Theory bisacsh COMPUTERS / Reference bisacsh Cloud computing fast Computer networks / Management fast Cyberinfrastructure fast Information technology / Government policy fast Information warfare fast Telecommunication fast Informatik Politik Cloud computing China Cyberinfrastructure China Information technology Government policy China Information warfare China Telecommunication China Computer networks China Management |
title | China's evolving IT capabilities cloud computing, network operations and cyber espionage |
title_alt | China's evolving information technology capabilities |
title_auth | China's evolving IT capabilities cloud computing, network operations and cyber espionage |
title_exact_search | China's evolving IT capabilities cloud computing, network operations and cyber espionage |
title_full | China's evolving IT capabilities cloud computing, network operations and cyber espionage Lucas Solorio, editor |
title_fullStr | China's evolving IT capabilities cloud computing, network operations and cyber espionage Lucas Solorio, editor |
title_full_unstemmed | China's evolving IT capabilities cloud computing, network operations and cyber espionage Lucas Solorio, editor |
title_short | China's evolving IT capabilities |
title_sort | china s evolving it capabilities cloud computing network operations and cyber espionage |
title_sub | cloud computing, network operations and cyber espionage |
topic | COMPUTERS / Computer Literacy bisacsh COMPUTERS / Computer Science bisacsh COMPUTERS / Data Processing bisacsh COMPUTERS / Hardware / General bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Machine Theory bisacsh COMPUTERS / Reference bisacsh Cloud computing fast Computer networks / Management fast Cyberinfrastructure fast Information technology / Government policy fast Information warfare fast Telecommunication fast Informatik Politik Cloud computing China Cyberinfrastructure China Information technology Government policy China Information warfare China Telecommunication China Computer networks China Management |
topic_facet | COMPUTERS / Computer Literacy COMPUTERS / Computer Science COMPUTERS / Data Processing COMPUTERS / Hardware / General COMPUTERS / Information Technology COMPUTERS / Machine Theory COMPUTERS / Reference Cloud computing Computer networks / Management Cyberinfrastructure Information technology / Government policy Information warfare Telecommunication Informatik Politik Cloud computing China Cyberinfrastructure China Information technology Government policy China Information warfare China Telecommunication China Computer networks China Management |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=673629 |
work_keys_str_mv | AT soloriolucas chinasevolvingitcapabilitiescloudcomputingnetworkoperationsandcyberespionage AT raglandleighann chinasevolvingitcapabilitiescloudcomputingnetworkoperationsandcyberespionage AT krekelbryana chinasevolvingitcapabilitiescloudcomputingnetworkoperationsandcyberespionage AT soloriolucas chinasevolvinginformationtechnologycapabilities AT raglandleighann chinasevolvinginformationtechnologycapabilities AT krekelbryana chinasevolvinginformationtechnologycapabilities |