21st century Chinese cyberwarfare: an examination of the Chinese cyberthreat from fundamentals of Communist policy regarding information warfare through the broad range of military, civilian and commercially supported cyberattack threat vectors = Twenty-first century Chinese cyberwarfare
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Ely, Cambridgeshire, United Kingdom
IT Governance Publishing
2012
|
Schlagworte: |
Cyberterrorism
> Government policy
> China
> Information warfare
> Government policy
> China
> Cyberspace
> Government policy
> China
> Hackers
> Government policy
> China
> Information warfare
> China
> Internet
> Political aspects
> China
> Internet
> Social aspects
> China
|
Beschreibung: | Print version record |
Beschreibung: | 1 online resource (349 pages) illustrations |
ISBN: | 9781849283359 1849283354 9781849283663 1849283664 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045349699 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 181210s2012 |||| o||u| ||||||eng d | ||
020 | |a 9781849283359 |9 978-1-84928-335-9 | ||
020 | |a 1849283354 |9 1-84928-335-4 | ||
020 | |a 9781849283663 |9 978-1-84928-366-3 | ||
020 | |a 1849283664 |9 1-84928-366-4 | ||
035 | |a (ZDB-4-ITC)ocn799769050 | ||
035 | |a (OCoLC)799769050 | ||
035 | |a (DE-599)BVBBV045349699 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 303.48/33 | |
082 | 0 | |a 303.48 | |
100 | 1 | |a Hagestad, William T. |e Verfasser |4 aut | |
245 | 1 | 0 | |a 21st century Chinese cyberwarfare |b an examination of the Chinese cyberthreat from fundamentals of Communist policy regarding information warfare through the broad range of military, civilian and commercially supported cyberattack threat vectors = Twenty-first century Chinese cyberwarfare |c William T. Hagestad II. |
246 | 1 | 3 | |a Twenty-first century Chinese cyberwarfare |
246 | 1 | 1 | |a Twenty-first century Chinese cyberwarfare |
264 | 1 | |a Ely, Cambridgeshire, United Kingdom |b IT Governance Publishing |c 2012 | |
300 | |a 1 online resource (349 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Print version record | ||
505 | 8 | |a 21st Century Chinese Cyberwarfare draws from a combination of business, cultural, historical, linguistic and the author's personal experience to attempt to explain China to the uninitiated. The objective of the book is to raise awareness of the fact that the People's Republic of China is using a combination of their unique culture, language, and political will, known as Chinese Communism, to maintain their cultural heritage | |
650 | 7 | |a COMPUTERS / Information Technology |2 bisacsh | |
650 | 7 | |a COMPUTERS / General |2 bisacsh | |
650 | 7 | |a Cyberspace / Government policy |2 fast | |
650 | 7 | |a Information warfare |2 fast | |
650 | 7 | |a Internet / Political aspects |2 fast | |
650 | 7 | |a Internet / Social aspects |2 fast | |
650 | 4 | |a Cyberterrorism |x Government policy |z China |a Information warfare |x Government policy |z China |a Cyberspace |x Government policy |z China |a Hackers |x Government policy |z China |a Information warfare |z China |a Internet |x Political aspects |z China |a Internet |x Social aspects |z China | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Hagestad, William T., II. |t 21st century Chinese cyberwarfare |d Cambridgeshire [England] : IT Governance Pub., 2012 |z 9781849283342 |
912 | |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030736353 |
Datensatz im Suchindex
_version_ | 1804179173815615489 |
---|---|
any_adam_object | |
author | Hagestad, William T. |
author_facet | Hagestad, William T. |
author_role | aut |
author_sort | Hagestad, William T. |
author_variant | w t h wt wth |
building | Verbundindex |
bvnumber | BV045349699 |
collection | ZDB-4-ITC |
contents | 21st Century Chinese Cyberwarfare draws from a combination of business, cultural, historical, linguistic and the author's personal experience to attempt to explain China to the uninitiated. The objective of the book is to raise awareness of the fact that the People's Republic of China is using a combination of their unique culture, language, and political will, known as Chinese Communism, to maintain their cultural heritage |
ctrlnum | (ZDB-4-ITC)ocn799769050 (OCoLC)799769050 (DE-599)BVBBV045349699 |
dewey-full | 303.48/33 303.48 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 303 - Social processes |
dewey-raw | 303.48/33 303.48 |
dewey-search | 303.48/33 303.48 |
dewey-sort | 3303.48 233 |
dewey-tens | 300 - Social sciences |
discipline | Soziologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02622nmm a2200469zc 4500</leader><controlfield tag="001">BV045349699</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181210s2012 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849283359</subfield><subfield code="9">978-1-84928-335-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849283354</subfield><subfield code="9">1-84928-335-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849283663</subfield><subfield code="9">978-1-84928-366-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849283664</subfield><subfield code="9">1-84928-366-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn799769050</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)799769050</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045349699</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">303.48/33</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">303.48</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hagestad, William T.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">21st century Chinese cyberwarfare</subfield><subfield code="b">an examination of the Chinese cyberthreat from fundamentals of Communist policy regarding information warfare through the broad range of military, civilian and commercially supported cyberattack threat vectors = Twenty-first century Chinese cyberwarfare</subfield><subfield code="c">William T. Hagestad II.</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Twenty-first century Chinese cyberwarfare</subfield></datafield><datafield tag="246" ind1="1" ind2="1"><subfield code="a">Twenty-first century Chinese cyberwarfare</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Ely, Cambridgeshire, United Kingdom</subfield><subfield code="b">IT Governance Publishing</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (349 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">21st Century Chinese Cyberwarfare draws from a combination of business, cultural, historical, linguistic and the author's personal experience to attempt to explain China to the uninitiated. The objective of the book is to raise awareness of the fact that the People's Republic of China is using a combination of their unique culture, language, and political will, known as Chinese Communism, to maintain their cultural heritage</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Information Technology</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberspace / Government policy</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information warfare</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet / Political aspects</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet / Social aspects</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield><subfield code="x">Government policy</subfield><subfield code="z">China</subfield><subfield code="a">Information warfare</subfield><subfield code="x">Government policy</subfield><subfield code="z">China</subfield><subfield code="a">Cyberspace</subfield><subfield code="x">Government policy</subfield><subfield code="z">China</subfield><subfield code="a">Hackers</subfield><subfield code="x">Government policy</subfield><subfield code="z">China</subfield><subfield code="a">Information warfare</subfield><subfield code="z">China</subfield><subfield code="a">Internet</subfield><subfield code="x">Political aspects</subfield><subfield code="z">China</subfield><subfield code="a">Internet</subfield><subfield code="x">Social aspects</subfield><subfield code="z">China</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Hagestad, William T., II.</subfield><subfield code="t">21st century Chinese cyberwarfare</subfield><subfield code="d">Cambridgeshire [England] : IT Governance Pub., 2012</subfield><subfield code="z">9781849283342</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030736353</subfield></datafield></record></collection> |
id | DE-604.BV045349699 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:15:40Z |
institution | BVB |
isbn | 9781849283359 1849283354 9781849283663 1849283664 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030736353 |
oclc_num | 799769050 |
open_access_boolean | |
physical | 1 online resource (349 pages) illustrations |
psigel | ZDB-4-ITC |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | IT Governance Publishing |
record_format | marc |
spelling | Hagestad, William T. Verfasser aut 21st century Chinese cyberwarfare an examination of the Chinese cyberthreat from fundamentals of Communist policy regarding information warfare through the broad range of military, civilian and commercially supported cyberattack threat vectors = Twenty-first century Chinese cyberwarfare William T. Hagestad II. Twenty-first century Chinese cyberwarfare Ely, Cambridgeshire, United Kingdom IT Governance Publishing 2012 1 online resource (349 pages) illustrations txt rdacontent c rdamedia cr rdacarrier Print version record 21st Century Chinese Cyberwarfare draws from a combination of business, cultural, historical, linguistic and the author's personal experience to attempt to explain China to the uninitiated. The objective of the book is to raise awareness of the fact that the People's Republic of China is using a combination of their unique culture, language, and political will, known as Chinese Communism, to maintain their cultural heritage COMPUTERS / Information Technology bisacsh COMPUTERS / General bisacsh Cyberspace / Government policy fast Information warfare fast Internet / Political aspects fast Internet / Social aspects fast Cyberterrorism Government policy China Information warfare Government policy China Cyberspace Government policy China Hackers Government policy China Information warfare China Internet Political aspects China Internet Social aspects China Erscheint auch als Druck-Ausgabe Hagestad, William T., II. 21st century Chinese cyberwarfare Cambridgeshire [England] : IT Governance Pub., 2012 9781849283342 |
spellingShingle | Hagestad, William T. 21st century Chinese cyberwarfare an examination of the Chinese cyberthreat from fundamentals of Communist policy regarding information warfare through the broad range of military, civilian and commercially supported cyberattack threat vectors = Twenty-first century Chinese cyberwarfare 21st Century Chinese Cyberwarfare draws from a combination of business, cultural, historical, linguistic and the author's personal experience to attempt to explain China to the uninitiated. The objective of the book is to raise awareness of the fact that the People's Republic of China is using a combination of their unique culture, language, and political will, known as Chinese Communism, to maintain their cultural heritage COMPUTERS / Information Technology bisacsh COMPUTERS / General bisacsh Cyberspace / Government policy fast Information warfare fast Internet / Political aspects fast Internet / Social aspects fast Cyberterrorism Government policy China Information warfare Government policy China Cyberspace Government policy China Hackers Government policy China Information warfare China Internet Political aspects China Internet Social aspects China |
title | 21st century Chinese cyberwarfare an examination of the Chinese cyberthreat from fundamentals of Communist policy regarding information warfare through the broad range of military, civilian and commercially supported cyberattack threat vectors = Twenty-first century Chinese cyberwarfare |
title_alt | Twenty-first century Chinese cyberwarfare |
title_auth | 21st century Chinese cyberwarfare an examination of the Chinese cyberthreat from fundamentals of Communist policy regarding information warfare through the broad range of military, civilian and commercially supported cyberattack threat vectors = Twenty-first century Chinese cyberwarfare |
title_exact_search | 21st century Chinese cyberwarfare an examination of the Chinese cyberthreat from fundamentals of Communist policy regarding information warfare through the broad range of military, civilian and commercially supported cyberattack threat vectors = Twenty-first century Chinese cyberwarfare |
title_full | 21st century Chinese cyberwarfare an examination of the Chinese cyberthreat from fundamentals of Communist policy regarding information warfare through the broad range of military, civilian and commercially supported cyberattack threat vectors = Twenty-first century Chinese cyberwarfare William T. Hagestad II. |
title_fullStr | 21st century Chinese cyberwarfare an examination of the Chinese cyberthreat from fundamentals of Communist policy regarding information warfare through the broad range of military, civilian and commercially supported cyberattack threat vectors = Twenty-first century Chinese cyberwarfare William T. Hagestad II. |
title_full_unstemmed | 21st century Chinese cyberwarfare an examination of the Chinese cyberthreat from fundamentals of Communist policy regarding information warfare through the broad range of military, civilian and commercially supported cyberattack threat vectors = Twenty-first century Chinese cyberwarfare William T. Hagestad II. |
title_short | 21st century Chinese cyberwarfare |
title_sort | 21st century chinese cyberwarfare an examination of the chinese cyberthreat from fundamentals of communist policy regarding information warfare through the broad range of military civilian and commercially supported cyberattack threat vectors twenty first century chinese cyberwarfare |
title_sub | an examination of the Chinese cyberthreat from fundamentals of Communist policy regarding information warfare through the broad range of military, civilian and commercially supported cyberattack threat vectors = Twenty-first century Chinese cyberwarfare |
topic | COMPUTERS / Information Technology bisacsh COMPUTERS / General bisacsh Cyberspace / Government policy fast Information warfare fast Internet / Political aspects fast Internet / Social aspects fast Cyberterrorism Government policy China Information warfare Government policy China Cyberspace Government policy China Hackers Government policy China Information warfare China Internet Political aspects China Internet Social aspects China |
topic_facet | COMPUTERS / Information Technology COMPUTERS / General Cyberspace / Government policy Information warfare Internet / Political aspects Internet / Social aspects Cyberterrorism Government policy China Information warfare Government policy China Cyberspace Government policy China Hackers Government policy China Information warfare China Internet Political aspects China Internet Social aspects China |
work_keys_str_mv | AT hagestadwilliamt 21stcenturychinesecyberwarfareanexaminationofthechinesecyberthreatfromfundamentalsofcommunistpolicyregardinginformationwarfarethroughthebroadrangeofmilitarycivilianandcommerciallysupportedcyberattackthreatvectorstwentyfirstcenturychinesecyberwarfare AT hagestadwilliamt twentyfirstcenturychinesecyberwarfare |