21st century Chinese cyberwarfare (Record no. 679627)

MARC details
000 -LEADER
fixed length control field 07127cam a2200625Ia 4500
001 - CONTROL NUMBER
control field ocn799769050
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240829143941.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr unu
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 121121s2012 enk ob 000 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency EBLCP
Language of cataloging eng
Transcribing agency EBLCP
Modifying agency YDXCP
-- OCLCQ
-- DOS
-- N$T
066 ## - CHARACTER SETS PRESENT
Alternate G0 or G1 character set $1
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781849283359 (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1849283354 (electronic bk.)
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)799769050
035 ## - SYSTEM CONTROL NUMBER
System control number 571552
-- (N$T)
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HV6773.15.C97
Item number H34 2012eb online
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 032000
Source bisacsh
082 14 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 303.48
-- 303.48/33
049 ## - LOCAL HOLDINGS (OCLC)
Holding library N$TA
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Hagestad, William T.,
Titles and words associated with a name II.
9 (RLIN) 642641
245 10 - TITLE STATEMENT
Title 21st century Chinese cyberwarfare
Medium [electronic resource] :
Remainder of title an examination of the Chinese cyberthreat from fundamentals of Communist policy regarding information warfare through the broad range of military, civilian and commercially supported cyberattack threat vectors /
Statement of responsibility, etc. William T. Hagestad II.
246 1# - VARYING FORM OF TITLE
Title proper/short title Twenty-first century Chinese cyberwarfare
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc. Ely, Cambridgeshire, United Kingdom :
Name of publisher, distributor, etc. IT Governance Publishing,
Date of publication, distribution, etc. 2012.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (xiv, 314 pages) :
Other physical details illustrations
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references (pages 275-314).
505 0# - FORMATTED CONTENTS NOTE
Linkage 880-01
Formatted contents note Cover; Title; Copyright; Foreword; Preface; About The Author; Acknowledgements; Contents; Introduction; Glossary; Cyberwarfare Definitions; Types of Hacker; Information Warfare Elements; Chapter 1: The Chinese Cyberthreat; Statistics of the Cyberwarfare Threat; 'Operation Titan Rain'; Statistics of the Chinese Cyberwarfare Threat; Conclusions about the Chinese Cyberthreat; Detailed Statement of the opportunity and problem; Chapter 2: Evolution of Chinese CyberWarfare; Overview of the Attackers; Communist Party of China (CPC); People's Liberation Army (PLA); State-owned Enterprises (SOE).
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Civilian Hackers (Hacktivists) Motivation of the People's Republic of China; History & Origins of Information Warfare in the People's Republic of China; An Overview of Chinese Cyberwarfare; Origins of Chinese Cyberwarfare; Purpose behind Chinese Cyberwar Doctrine; China's 'Cyber Command'; Perspectives on China's 'Cyber Command'; Chapter 3: Chinese Unrestricted Warfare; War Without Limits; What is Unrestricted Warfare & who is behind it?; Eight Principles of Chinese Unrestricted Warfare; The Challenge of Information Warfare; Chapter 4: Principles of warfare -- West versus East.
505 8# - FORMATTED CONTENTS NOTE
Linkage 880-02
Formatted contents note Information Warfare: A new form of people's war ideas Guide Action; Information War Depends on the Integrity of the Information System; Chapter 6: Chinese CyberWarfare Doctrines; Chinese Cyberwarfare Doctrinal Development; Importance of Information Warfare; Goals of Chinese Information Warfare; Integrated Network Electronic Warfare (INEW); The 'Three Warfares' concept; The PRC's concept of 21st century warfare; Secrecy and Deception in PLA Military Strategy; Asymmetric Warfighting; Assassin's Mace Programs; Major General Dai Qingmin's Cyberwar; Conclusions.
500 ## - GENERAL NOTE
General note Technical Reconnaissance Bureaus (TRB).
520 ## - SUMMARY, ETC.
Summary, etc. Military doctrine of the People's Republic of China (PRC) envisages war being waged in five spheres: land, sea, air, outer space and cyberspace. The PRC believes that the early degradation, or destruction, of an enemy's command and control infrastructure will significantly improve its chances of ultimate victory. But the Chinese 21st century approach to cyberwarfare is both more sophisticated and comprehensive than that. This book examines the military background to today's doctrines, and explores how the teachings of Sun Tzu, the thirty-six principles from the warring states era and the hard-learnt lessons of Mao's long march infuse and support the modern state's approach to engaging with enemies and rivals. Chinese cyberwarriors, operating from behind the great firewall of China, have substantial campaign experience, and this book reviews operations from Titan Rain -- sustained multi-year cyberattacks against the US that started in 2003 -- to the most recent, ShadyRAT. This book also reviews the contributions made to the overall Chinese cyberstrategy by civilian hackers and state-owned enterprises and looks at how advanced persistent threats already undermine many of China's rival states and enterprises. China's rivals lack a coherent cyberstrategy of their own. They also do not understand the complex cultural, political and historical routes of the modern Chinese state and this is a significant weakness. This book helps everyone with an interest in cybersecurity to "know their enemy".
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Description based on print version record.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cyberterrorism
General subdivision Government policy
Geographic subdivision China.
9 (RLIN) 642642
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information warfare
General subdivision Government policy
Geographic subdivision China.
9 (RLIN) 642643
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cyberspace
General subdivision Government policy
Geographic subdivision China.
9 (RLIN) 642644
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer hackers
General subdivision Government policy
Geographic subdivision China.
9 (RLIN) 998839
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information warfare
Geographic subdivision China.
9 (RLIN) 642646
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Internet
General subdivision Political aspects
Geographic subdivision China.
9 (RLIN) 371328
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Internet
General subdivision Social aspects
Geographic subdivision China.
9 (RLIN) 447306
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS / Information Technology
Source of heading or term bisacsh
9 (RLIN) 188781
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
9 (RLIN) 396
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
Main entry heading Hagestad, William T., II.
Title 21st century Chinese cyberwarfare.
Place, publisher, and date of publication Cambridgeshire [England] : IT Governance Pub., 2012
International Standard Book Number 9781849283342
Record control number (OCoLC)769420458
856 40 - ELECTRONIC LOCATION AND ACCESS
Materials specified EBSCOhost
Uniform Resource Identifier <a href="https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=571552">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=571552</a>
880 8# - ALTERNATE GRAPHIC REPRESENTATION
Linkage 505-01/$1
a Rules of Engagement: PLA's Information Dominance chapter 7: China's SIGINT Capabilities; China and information warfare (IW): Signals Intelligence (SIGINT), Electronic Warfare (EW) and Cyberwarfare (CW); The PLA SIGINT ground stations; Airborne SIGINT capabilities; Chinese Naval SIGINT Activities; Chinese PLA Electronic warfare; Airborne EW systems; Chapter 8: Chinese IW Capabilities; Assessing China's IW Capabilities; Chapter 9: The Chinese IW Organizational Structure; Key PLA Departments: Integrated Network Electronic Warfare (INEW); General Staff Department Third Department总参三部.
880 8# - ALTERNATE GRAPHIC REPRESENTATION
Linkage 505-02/$1
a Warfare -- Mapping East to West'On War' -- Carl Von Clausewitz 1780 -1831 A.D.; 'The Art of War' -- Sun Tzu 544 -- 496 B.C.; Principles of Chinese Cyberwarfare -中国网络战的原则; The PLA's 制信息权 Information Dominance; Chinese Information War Theory and Implementation; Stratagems when in a superior position; Stratagems for confrontation; Stratagems for attack; Stratagems for attack; Stratagems for gaining cyberground; Stratagems for desperate situations; Chapter 5: Nature of Information warfare; Information Warfare; The IW Impact on Combat Concepts; The IW Impact on Organizational Structure.
938 ## -
-- EBL - Ebook Library
-- EBLB
-- EBL918805
938 ## -
-- YBP Library Services
-- YANK
-- 9241857
938 ## -
-- EBSCOhost
-- EBSC
-- 571552
910 ## - USER-OPTION DATA (OCLC)
User-option data cpp1723AUTO
994 ## -
-- 02
-- N$T
Holdings
Withdrawn status Lost status Damaged status Not for loan Collection code Home library Current library Date acquired Total Checkouts Date last seen Price effective from Koha item type
  Not Lost     EBSCO Computers e-Library   29/08/2024   29/08/2024 29/08/2024 eBook

Powered by Koha