MARC details
| 000 -LEADER |
| fixed length control field |
07127cam a2200625Ia 4500 |
| 001 - CONTROL NUMBER |
| control field |
ocn799769050 |
| 003 - CONTROL NUMBER IDENTIFIER |
| control field |
OCoLC |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20240829143941.0 |
| 006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS |
| fixed length control field |
m d |
| 007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
| fixed length control field |
cr unu |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
121121s2012 enk ob 000 0 eng d |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
EBLCP |
| Language of cataloging |
eng |
| Transcribing agency |
EBLCP |
| Modifying agency |
YDXCP |
| -- |
OCLCQ |
| -- |
DOS |
| -- |
N$T |
| 066 ## - CHARACTER SETS PRESENT |
| Alternate G0 or G1 character set |
$1 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9781849283359 (electronic bk.) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
1849283354 (electronic bk.) |
| 035 ## - SYSTEM CONTROL NUMBER |
| System control number |
(OCoLC)799769050 |
| 035 ## - SYSTEM CONTROL NUMBER |
| System control number |
571552 |
| -- |
(N$T) |
| 050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
| Classification number |
HV6773.15.C97 |
| Item number |
H34 2012eb online |
| 072 #7 - SUBJECT CATEGORY CODE |
| Subject category code |
COM |
| Subject category code subdivision |
032000 |
| Source |
bisacsh |
| 082 14 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
303.48 |
| -- |
303.48/33 |
| 049 ## - LOCAL HOLDINGS (OCLC) |
| Holding library |
N$TA |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Hagestad, William T., |
| Titles and words associated with a name |
II. |
| 9 (RLIN) |
642641 |
| 245 10 - TITLE STATEMENT |
| Title |
21st century Chinese cyberwarfare |
| Medium |
[electronic resource] : |
| Remainder of title |
an examination of the Chinese cyberthreat from fundamentals of Communist policy regarding information warfare through the broad range of military, civilian and commercially supported cyberattack threat vectors / |
| Statement of responsibility, etc. |
William T. Hagestad II. |
| 246 1# - VARYING FORM OF TITLE |
| Title proper/short title |
Twenty-first century Chinese cyberwarfare |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
| Place of publication, distribution, etc. |
Ely, Cambridgeshire, United Kingdom : |
| Name of publisher, distributor, etc. |
IT Governance Publishing, |
| Date of publication, distribution, etc. |
2012. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
1 online resource (xiv, 314 pages) : |
| Other physical details |
illustrations |
| 336 ## - CONTENT TYPE |
| Content type term |
text |
| Content type code |
txt |
| Source |
rdacontent |
| 337 ## - MEDIA TYPE |
| Media type term |
computer |
| Media type code |
c |
| Source |
rdamedia |
| 338 ## - CARRIER TYPE |
| Carrier type term |
online resource |
| Carrier type code |
cr |
| Source |
rdacarrier |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc |
Includes bibliographical references (pages 275-314). |
| 505 0# - FORMATTED CONTENTS NOTE |
| Linkage |
880-01 |
| Formatted contents note |
Cover; Title; Copyright; Foreword; Preface; About The Author; Acknowledgements; Contents; Introduction; Glossary; Cyberwarfare Definitions; Types of Hacker; Information Warfare Elements; Chapter 1: The Chinese Cyberthreat; Statistics of the Cyberwarfare Threat; 'Operation Titan Rain'; Statistics of the Chinese Cyberwarfare Threat; Conclusions about the Chinese Cyberthreat; Detailed Statement of the opportunity and problem; Chapter 2: Evolution of Chinese CyberWarfare; Overview of the Attackers; Communist Party of China (CPC); People's Liberation Army (PLA); State-owned Enterprises (SOE). |
| 505 8# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Civilian Hackers (Hacktivists) Motivation of the People's Republic of China; History & Origins of Information Warfare in the People's Republic of China; An Overview of Chinese Cyberwarfare; Origins of Chinese Cyberwarfare; Purpose behind Chinese Cyberwar Doctrine; China's 'Cyber Command'; Perspectives on China's 'Cyber Command'; Chapter 3: Chinese Unrestricted Warfare; War Without Limits; What is Unrestricted Warfare & who is behind it?; Eight Principles of Chinese Unrestricted Warfare; The Challenge of Information Warfare; Chapter 4: Principles of warfare -- West versus East. |
| 505 8# - FORMATTED CONTENTS NOTE |
| Linkage |
880-02 |
| Formatted contents note |
Information Warfare: A new form of people's war ideas Guide Action; Information War Depends on the Integrity of the Information System; Chapter 6: Chinese CyberWarfare Doctrines; Chinese Cyberwarfare Doctrinal Development; Importance of Information Warfare; Goals of Chinese Information Warfare; Integrated Network Electronic Warfare (INEW); The 'Three Warfares' concept; The PRC's concept of 21st century warfare; Secrecy and Deception in PLA Military Strategy; Asymmetric Warfighting; Assassin's Mace Programs; Major General Dai Qingmin's Cyberwar; Conclusions. |
| 500 ## - GENERAL NOTE |
| General note |
Technical Reconnaissance Bureaus (TRB). |
| 520 ## - SUMMARY, ETC. |
| Summary, etc. |
Military doctrine of the People's Republic of China (PRC) envisages war being waged in five spheres: land, sea, air, outer space and cyberspace. The PRC believes that the early degradation, or destruction, of an enemy's command and control infrastructure will significantly improve its chances of ultimate victory. But the Chinese 21st century approach to cyberwarfare is both more sophisticated and comprehensive than that. This book examines the military background to today's doctrines, and explores how the teachings of Sun Tzu, the thirty-six principles from the warring states era and the hard-learnt lessons of Mao's long march infuse and support the modern state's approach to engaging with enemies and rivals. Chinese cyberwarriors, operating from behind the great firewall of China, have substantial campaign experience, and this book reviews operations from Titan Rain -- sustained multi-year cyberattacks against the US that started in 2003 -- to the most recent, ShadyRAT. This book also reviews the contributions made to the overall Chinese cyberstrategy by civilian hackers and state-owned enterprises and looks at how advanced persistent threats already undermine many of China's rival states and enterprises. China's rivals lack a coherent cyberstrategy of their own. They also do not understand the complex cultural, political and historical routes of the modern Chinese state and this is a significant weakness. This book helps everyone with an interest in cybersecurity to "know their enemy". |
| 588 ## - SOURCE OF DESCRIPTION NOTE |
| Source of description note |
Description based on print version record. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Cyberterrorism |
| General subdivision |
Government policy |
| Geographic subdivision |
China. |
| 9 (RLIN) |
642642 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Information warfare |
| General subdivision |
Government policy |
| Geographic subdivision |
China. |
| 9 (RLIN) |
642643 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Cyberspace |
| General subdivision |
Government policy |
| Geographic subdivision |
China. |
| 9 (RLIN) |
642644 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer hackers |
| General subdivision |
Government policy |
| Geographic subdivision |
China. |
| 9 (RLIN) |
998839 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Information warfare |
| Geographic subdivision |
China. |
| 9 (RLIN) |
642646 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Internet |
| General subdivision |
Political aspects |
| Geographic subdivision |
China. |
| 9 (RLIN) |
371328 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Internet |
| General subdivision |
Social aspects |
| Geographic subdivision |
China. |
| 9 (RLIN) |
447306 |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
COMPUTERS / Information Technology |
| Source of heading or term |
bisacsh |
| 9 (RLIN) |
188781 |
| 655 #4 - INDEX TERM--GENRE/FORM |
| Genre/form data or focus term |
Electronic books. |
| 9 (RLIN) |
396 |
| 776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
| Relationship information |
Print version: |
| Main entry heading |
Hagestad, William T., II. |
| Title |
21st century Chinese cyberwarfare. |
| Place, publisher, and date of publication |
Cambridgeshire [England] : IT Governance Pub., 2012 |
| International Standard Book Number |
9781849283342 |
| Record control number |
(OCoLC)769420458 |
| 856 40 - ELECTRONIC LOCATION AND ACCESS |
| Materials specified |
EBSCOhost |
| Uniform Resource Identifier |
<a href="https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=571552">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=571552</a> |
| 880 8# - ALTERNATE GRAPHIC REPRESENTATION |
| Linkage |
505-01/$1 |
| a |
Rules of Engagement: PLA's Information Dominance chapter 7: China's SIGINT Capabilities; China and information warfare (IW): Signals Intelligence (SIGINT), Electronic Warfare (EW) and Cyberwarfare (CW); The PLA SIGINT ground stations; Airborne SIGINT capabilities; Chinese Naval SIGINT Activities; Chinese PLA Electronic warfare; Airborne EW systems; Chapter 8: Chinese IW Capabilities; Assessing China's IW Capabilities; Chapter 9: The Chinese IW Organizational Structure; Key PLA Departments: Integrated Network Electronic Warfare (INEW); General Staff Department Third Department总参三部. |
| 880 8# - ALTERNATE GRAPHIC REPRESENTATION |
| Linkage |
505-02/$1 |
| a |
Warfare -- Mapping East to West'On War' -- Carl Von Clausewitz 1780 -1831 A.D.; 'The Art of War' -- Sun Tzu 544 -- 496 B.C.; Principles of Chinese Cyberwarfare -中国网络战的原则; The PLA's 制信息权 Information Dominance; Chinese Information War Theory and Implementation; Stratagems when in a superior position; Stratagems for confrontation; Stratagems for attack; Stratagems for attack; Stratagems for gaining cyberground; Stratagems for desperate situations; Chapter 5: Nature of Information warfare; Information Warfare; The IW Impact on Combat Concepts; The IW Impact on Organizational Structure. |
| 938 ## - |
| -- |
EBL - Ebook Library |
| -- |
EBLB |
| -- |
EBL918805 |
| 938 ## - |
| -- |
YBP Library Services |
| -- |
YANK |
| -- |
9241857 |
| 938 ## - |
| -- |
EBSCOhost |
| -- |
EBSC |
| -- |
571552 |
| 910 ## - USER-OPTION DATA (OCLC) |
| User-option data |
cpp1723AUTO |
| 994 ## - |
| -- |
02 |
| -- |
N$T |