21st century Chinese cyberwarfare: an examination of the Chinese cyberthreat from fundamentals of Communist policy regarding information warfare through the broad range of military, civilian and commercially supported cyberattack threat vectors
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Ely, Cambridgeshire, United Kingdom
IT Governance Publishing
2012
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Includes bibliographical references |
Beschreibung: | 1 Online-Ressource (xiv, 314 pages) |
ISBN: | 1849283346 1849283354 1849283664 9781849283342 9781849283359 9781849283663 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043082376 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2012 |||| o||u| ||||||eng d | ||
020 | |a 1849283346 |9 1-84928-334-6 | ||
020 | |a 1849283354 |9 1-84928-335-4 | ||
020 | |a 1849283664 |9 1-84928-366-4 | ||
020 | |a 9781849283342 |9 978-1-84928-334-2 | ||
020 | |a 9781849283359 |9 978-1-84928-335-9 | ||
020 | |a 9781849283663 |9 978-1-84928-366-3 | ||
035 | |a (OCoLC)799769050 | ||
035 | |a (DE-599)BVBBV043082376 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 303.48 | |
082 | 0 | |a 303.48/33 | |
100 | 1 | |a Hagestad, William T., II. |e Verfasser |4 aut | |
245 | 1 | 0 | |a 21st century Chinese cyberwarfare |b an examination of the Chinese cyberthreat from fundamentals of Communist policy regarding information warfare through the broad range of military, civilian and commercially supported cyberattack threat vectors |c William T. Hagestad II. |
246 | 1 | 3 | |a Twenty-first century Chinese cyberwarfare |
264 | 1 | |a Ely, Cambridgeshire, United Kingdom |b IT Governance Publishing |c 2012 | |
300 | |a 1 Online-Ressource (xiv, 314 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references | ||
650 | 4 | |a Cyberterrorism / Government policy / China | |
650 | 4 | |a Information warfare / Government policy / China | |
650 | 4 | |a Cyberspace / Government policy / China | |
650 | 4 | |a Computer hackers / Government policy / China | |
650 | 4 | |a Intellectual property / Government policy / China | |
650 | 7 | |a COMPUTERS / Information Technology |2 bisacsh | |
650 | 7 | |a COMPUTERS / General |2 bisacsh | |
650 | 4 | |a Gesellschaft | |
650 | 4 | |a Politik | |
650 | 4 | |a Cyberterrorism |x Government policy |z China | |
650 | 4 | |a Information warfare |x Government policy |z China | |
650 | 4 | |a Cyberspace |x Government policy |z China | |
650 | 4 | |a Hackers |x Government policy |z China | |
650 | 4 | |a Information warfare |z China | |
650 | 4 | |a Internet |x Political aspects |z China | |
650 | 4 | |a Internet |x Social aspects |z China | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=571552 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028506568 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=571552 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=571552 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175475610746880 |
---|---|
any_adam_object | |
author | Hagestad, William T., II |
author_facet | Hagestad, William T., II |
author_role | aut |
author_sort | Hagestad, William T., II |
author_variant | w t i h wti wtih |
building | Verbundindex |
bvnumber | BV043082376 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)799769050 (DE-599)BVBBV043082376 |
dewey-full | 303.48 303.48/33 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 303 - Social processes |
dewey-raw | 303.48 303.48/33 |
dewey-search | 303.48 303.48/33 |
dewey-sort | 3303.48 |
dewey-tens | 300 - Social sciences |
discipline | Soziologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02692nmm a2200601zc 4500</leader><controlfield tag="001">BV043082376</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2012 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849283346</subfield><subfield code="9">1-84928-334-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849283354</subfield><subfield code="9">1-84928-335-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849283664</subfield><subfield code="9">1-84928-366-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849283342</subfield><subfield code="9">978-1-84928-334-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849283359</subfield><subfield code="9">978-1-84928-335-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849283663</subfield><subfield code="9">978-1-84928-366-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)799769050</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043082376</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">303.48</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">303.48/33</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hagestad, William T., II.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">21st century Chinese cyberwarfare</subfield><subfield code="b">an examination of the Chinese cyberthreat from fundamentals of Communist policy regarding information warfare through the broad range of military, civilian and commercially supported cyberattack threat vectors</subfield><subfield code="c">William T. Hagestad II.</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Twenty-first century Chinese cyberwarfare</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Ely, Cambridgeshire, United Kingdom</subfield><subfield code="b">IT Governance Publishing</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xiv, 314 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism / Government policy / China</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information warfare / Government policy / China</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberspace / Government policy / China</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer hackers / Government policy / China</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Intellectual property / Government policy / China</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Information Technology</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Gesellschaft</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Politik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield><subfield code="x">Government policy</subfield><subfield code="z">China</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information warfare</subfield><subfield code="x">Government policy</subfield><subfield code="z">China</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberspace</subfield><subfield code="x">Government policy</subfield><subfield code="z">China</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hackers</subfield><subfield code="x">Government policy</subfield><subfield code="z">China</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information warfare</subfield><subfield code="z">China</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield><subfield code="x">Political aspects</subfield><subfield code="z">China</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield><subfield code="x">Social aspects</subfield><subfield code="z">China</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=571552</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028506568</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=571552</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=571552</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043082376 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:16:53Z |
institution | BVB |
isbn | 1849283346 1849283354 1849283664 9781849283342 9781849283359 9781849283663 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028506568 |
oclc_num | 799769050 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xiv, 314 pages) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | IT Governance Publishing |
record_format | marc |
spelling | Hagestad, William T., II. Verfasser aut 21st century Chinese cyberwarfare an examination of the Chinese cyberthreat from fundamentals of Communist policy regarding information warfare through the broad range of military, civilian and commercially supported cyberattack threat vectors William T. Hagestad II. Twenty-first century Chinese cyberwarfare Ely, Cambridgeshire, United Kingdom IT Governance Publishing 2012 1 Online-Ressource (xiv, 314 pages) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references Cyberterrorism / Government policy / China Information warfare / Government policy / China Cyberspace / Government policy / China Computer hackers / Government policy / China Intellectual property / Government policy / China COMPUTERS / Information Technology bisacsh COMPUTERS / General bisacsh Gesellschaft Politik Cyberterrorism Government policy China Information warfare Government policy China Cyberspace Government policy China Hackers Government policy China Information warfare China Internet Political aspects China Internet Social aspects China http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=571552 Aggregator Volltext |
spellingShingle | Hagestad, William T., II 21st century Chinese cyberwarfare an examination of the Chinese cyberthreat from fundamentals of Communist policy regarding information warfare through the broad range of military, civilian and commercially supported cyberattack threat vectors Cyberterrorism / Government policy / China Information warfare / Government policy / China Cyberspace / Government policy / China Computer hackers / Government policy / China Intellectual property / Government policy / China COMPUTERS / Information Technology bisacsh COMPUTERS / General bisacsh Gesellschaft Politik Cyberterrorism Government policy China Information warfare Government policy China Cyberspace Government policy China Hackers Government policy China Information warfare China Internet Political aspects China Internet Social aspects China |
title | 21st century Chinese cyberwarfare an examination of the Chinese cyberthreat from fundamentals of Communist policy regarding information warfare through the broad range of military, civilian and commercially supported cyberattack threat vectors |
title_alt | Twenty-first century Chinese cyberwarfare |
title_auth | 21st century Chinese cyberwarfare an examination of the Chinese cyberthreat from fundamentals of Communist policy regarding information warfare through the broad range of military, civilian and commercially supported cyberattack threat vectors |
title_exact_search | 21st century Chinese cyberwarfare an examination of the Chinese cyberthreat from fundamentals of Communist policy regarding information warfare through the broad range of military, civilian and commercially supported cyberattack threat vectors |
title_full | 21st century Chinese cyberwarfare an examination of the Chinese cyberthreat from fundamentals of Communist policy regarding information warfare through the broad range of military, civilian and commercially supported cyberattack threat vectors William T. Hagestad II. |
title_fullStr | 21st century Chinese cyberwarfare an examination of the Chinese cyberthreat from fundamentals of Communist policy regarding information warfare through the broad range of military, civilian and commercially supported cyberattack threat vectors William T. Hagestad II. |
title_full_unstemmed | 21st century Chinese cyberwarfare an examination of the Chinese cyberthreat from fundamentals of Communist policy regarding information warfare through the broad range of military, civilian and commercially supported cyberattack threat vectors William T. Hagestad II. |
title_short | 21st century Chinese cyberwarfare |
title_sort | 21st century chinese cyberwarfare an examination of the chinese cyberthreat from fundamentals of communist policy regarding information warfare through the broad range of military civilian and commercially supported cyberattack threat vectors |
title_sub | an examination of the Chinese cyberthreat from fundamentals of Communist policy regarding information warfare through the broad range of military, civilian and commercially supported cyberattack threat vectors |
topic | Cyberterrorism / Government policy / China Information warfare / Government policy / China Cyberspace / Government policy / China Computer hackers / Government policy / China Intellectual property / Government policy / China COMPUTERS / Information Technology bisacsh COMPUTERS / General bisacsh Gesellschaft Politik Cyberterrorism Government policy China Information warfare Government policy China Cyberspace Government policy China Hackers Government policy China Information warfare China Internet Political aspects China Internet Social aspects China |
topic_facet | Cyberterrorism / Government policy / China Information warfare / Government policy / China Cyberspace / Government policy / China Computer hackers / Government policy / China Intellectual property / Government policy / China COMPUTERS / Information Technology COMPUTERS / General Gesellschaft Politik Cyberterrorism Government policy China Information warfare Government policy China Cyberspace Government policy China Hackers Government policy China Information warfare China Internet Political aspects China Internet Social aspects China |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=571552 |
work_keys_str_mv | AT hagestadwilliamtii 21stcenturychinesecyberwarfareanexaminationofthechinesecyberthreatfromfundamentalsofcommunistpolicyregardinginformationwarfarethroughthebroadrangeofmilitarycivilianandcommerciallysupportedcyberattackthreatvectors AT hagestadwilliamtii twentyfirstcenturychinesecyberwarfare |