000 07127cam a2200625Ia 4500
001 ocn799769050
003 OCoLC
005 20240829143941.0
006 m d
007 cr unu
008 121121s2012 enk ob 000 0 eng d
040 _aEBLCP
_beng
_cEBLCP
_dYDXCP
_dOCLCQ
_dDOS
_dN$T
066 _c$1
020 _a9781849283359 (electronic bk.)
020 _a1849283354 (electronic bk.)
035 _a(OCoLC)799769050
035 _a571552
_b(N$T)
050 4 _aHV6773.15.C97
_bH34 2012eb online
072 7 _aCOM
_x032000
_2bisacsh
082 1 4 _a303.48
_a303.48/33
049 _aN$TA
100 1 _aHagestad, William T.,
_cII.
_9642641
245 1 0 _a21st century Chinese cyberwarfare
_h[electronic resource] :
_ban examination of the Chinese cyberthreat from fundamentals of Communist policy regarding information warfare through the broad range of military, civilian and commercially supported cyberattack threat vectors /
_cWilliam T. Hagestad II.
246 1 _aTwenty-first century Chinese cyberwarfare
260 _aEly, Cambridgeshire, United Kingdom :
_bIT Governance Publishing,
_c2012.
300 _a1 online resource (xiv, 314 pages) :
_billustrations
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
504 _aIncludes bibliographical references (pages 275-314).
505 0 _6880-01
_aCover; Title; Copyright; Foreword; Preface; About The Author; Acknowledgements; Contents; Introduction; Glossary; Cyberwarfare Definitions; Types of Hacker; Information Warfare Elements; Chapter 1: The Chinese Cyberthreat; Statistics of the Cyberwarfare Threat; 'Operation Titan Rain'; Statistics of the Chinese Cyberwarfare Threat; Conclusions about the Chinese Cyberthreat; Detailed Statement of the opportunity and problem; Chapter 2: Evolution of Chinese CyberWarfare; Overview of the Attackers; Communist Party of China (CPC); People's Liberation Army (PLA); State-owned Enterprises (SOE).
505 8 _aCivilian Hackers (Hacktivists) Motivation of the People's Republic of China; History & Origins of Information Warfare in the People's Republic of China; An Overview of Chinese Cyberwarfare; Origins of Chinese Cyberwarfare; Purpose behind Chinese Cyberwar Doctrine; China's 'Cyber Command'; Perspectives on China's 'Cyber Command'; Chapter 3: Chinese Unrestricted Warfare; War Without Limits; What is Unrestricted Warfare & who is behind it?; Eight Principles of Chinese Unrestricted Warfare; The Challenge of Information Warfare; Chapter 4: Principles of warfare -- West versus East.
505 8 _6880-02
_aInformation Warfare: A new form of people's war ideas Guide Action; Information War Depends on the Integrity of the Information System; Chapter 6: Chinese CyberWarfare Doctrines; Chinese Cyberwarfare Doctrinal Development; Importance of Information Warfare; Goals of Chinese Information Warfare; Integrated Network Electronic Warfare (INEW); The 'Three Warfares' concept; The PRC's concept of 21st century warfare; Secrecy and Deception in PLA Military Strategy; Asymmetric Warfighting; Assassin's Mace Programs; Major General Dai Qingmin's Cyberwar; Conclusions.
500 _aTechnical Reconnaissance Bureaus (TRB).
520 _aMilitary doctrine of the People's Republic of China (PRC) envisages war being waged in five spheres: land, sea, air, outer space and cyberspace. The PRC believes that the early degradation, or destruction, of an enemy's command and control infrastructure will significantly improve its chances of ultimate victory. But the Chinese 21st century approach to cyberwarfare is both more sophisticated and comprehensive than that. This book examines the military background to today's doctrines, and explores how the teachings of Sun Tzu, the thirty-six principles from the warring states era and the hard-learnt lessons of Mao's long march infuse and support the modern state's approach to engaging with enemies and rivals. Chinese cyberwarriors, operating from behind the great firewall of China, have substantial campaign experience, and this book reviews operations from Titan Rain -- sustained multi-year cyberattacks against the US that started in 2003 -- to the most recent, ShadyRAT. This book also reviews the contributions made to the overall Chinese cyberstrategy by civilian hackers and state-owned enterprises and looks at how advanced persistent threats already undermine many of China's rival states and enterprises. China's rivals lack a coherent cyberstrategy of their own. They also do not understand the complex cultural, political and historical routes of the modern Chinese state and this is a significant weakness. This book helps everyone with an interest in cybersecurity to "know their enemy".
588 _aDescription based on print version record.
650 0 _aCyberterrorism
_xGovernment policy
_zChina.
_9642642
650 0 _aInformation warfare
_xGovernment policy
_zChina.
_9642643
650 0 _aCyberspace
_xGovernment policy
_zChina.
_9642644
650 0 _aComputer hackers
_xGovernment policy
_zChina.
_9998839
650 0 _aInformation warfare
_zChina.
_9642646
650 0 _aInternet
_xPolitical aspects
_zChina.
_9371328
650 0 _aInternet
_xSocial aspects
_zChina.
_9447306
650 7 _aCOMPUTERS / Information Technology
_2bisacsh
_9188781
655 4 _aElectronic books.
_9396
776 0 8 _iPrint version:
_aHagestad, William T., II.
_t21st century Chinese cyberwarfare.
_dCambridgeshire [England] : IT Governance Pub., 2012
_z9781849283342
_w(OCoLC)769420458
856 4 0 _3EBSCOhost
_uhttps://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=571552
880 8 _6505-01/$1
_aRules of Engagement: PLA's Information Dominance chapter 7: China's SIGINT Capabilities; China and information warfare (IW): Signals Intelligence (SIGINT), Electronic Warfare (EW) and Cyberwarfare (CW); The PLA SIGINT ground stations; Airborne SIGINT capabilities; Chinese Naval SIGINT Activities; Chinese PLA Electronic warfare; Airborne EW systems; Chapter 8: Chinese IW Capabilities; Assessing China's IW Capabilities; Chapter 9: The Chinese IW Organizational Structure; Key PLA Departments: Integrated Network Electronic Warfare (INEW); General Staff Department Third Department总参三部.
880 8 _6505-02/$1
_aWarfare -- Mapping East to West'On War' -- Carl Von Clausewitz 1780 -1831 A.D.; 'The Art of War' -- Sun Tzu 544 -- 496 B.C.; Principles of Chinese Cyberwarfare -中国网络战的原则; The PLA's 制信息权 Information Dominance; Chinese Information War Theory and Implementation; Stratagems when in a superior position; Stratagems for confrontation; Stratagems for attack; Stratagems for attack; Stratagems for gaining cyberground; Stratagems for desperate situations; Chapter 5: Nature of Information warfare; Information Warfare; The IW Impact on Combat Concepts; The IW Impact on Organizational Structure.
938 _aEBL - Ebook Library
_bEBLB
_nEBL918805
938 _aYBP Library Services
_bYANK
_n9241857
938 _aEBSCOhost
_bEBSC
_n571552
910 _acpp1723AUTO
994 _a02
_bN$T
999 _c679627
_d679627