| 000 | 07127cam a2200625Ia 4500 | ||
|---|---|---|---|
| 001 | ocn799769050 | ||
| 003 | OCoLC | ||
| 005 | 20240829143941.0 | ||
| 006 | m d | ||
| 007 | cr unu | ||
| 008 | 121121s2012 enk ob 000 0 eng d | ||
| 040 |
_aEBLCP _beng _cEBLCP _dYDXCP _dOCLCQ _dDOS _dN$T |
||
| 066 | _c$1 | ||
| 020 | _a9781849283359 (electronic bk.) | ||
| 020 | _a1849283354 (electronic bk.) | ||
| 035 | _a(OCoLC)799769050 | ||
| 035 |
_a571552 _b(N$T) |
||
| 050 | 4 |
_aHV6773.15.C97 _bH34 2012eb online |
|
| 072 | 7 |
_aCOM _x032000 _2bisacsh |
|
| 082 | 1 | 4 |
_a303.48 _a303.48/33 |
| 049 | _aN$TA | ||
| 100 | 1 |
_aHagestad, William T., _cII. _9642641 |
|
| 245 | 1 | 0 |
_a21st century Chinese cyberwarfare _h[electronic resource] : _ban examination of the Chinese cyberthreat from fundamentals of Communist policy regarding information warfare through the broad range of military, civilian and commercially supported cyberattack threat vectors / _cWilliam T. Hagestad II. |
| 246 | 1 | _aTwenty-first century Chinese cyberwarfare | |
| 260 |
_aEly, Cambridgeshire, United Kingdom : _bIT Governance Publishing, _c2012. |
||
| 300 |
_a1 online resource (xiv, 314 pages) : _billustrations |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 504 | _aIncludes bibliographical references (pages 275-314). | ||
| 505 | 0 |
_6880-01 _aCover; Title; Copyright; Foreword; Preface; About The Author; Acknowledgements; Contents; Introduction; Glossary; Cyberwarfare Definitions; Types of Hacker; Information Warfare Elements; Chapter 1: The Chinese Cyberthreat; Statistics of the Cyberwarfare Threat; 'Operation Titan Rain'; Statistics of the Chinese Cyberwarfare Threat; Conclusions about the Chinese Cyberthreat; Detailed Statement of the opportunity and problem; Chapter 2: Evolution of Chinese CyberWarfare; Overview of the Attackers; Communist Party of China (CPC); People's Liberation Army (PLA); State-owned Enterprises (SOE). |
|
| 505 | 8 | _aCivilian Hackers (Hacktivists) Motivation of the People's Republic of China; History & Origins of Information Warfare in the People's Republic of China; An Overview of Chinese Cyberwarfare; Origins of Chinese Cyberwarfare; Purpose behind Chinese Cyberwar Doctrine; China's 'Cyber Command'; Perspectives on China's 'Cyber Command'; Chapter 3: Chinese Unrestricted Warfare; War Without Limits; What is Unrestricted Warfare & who is behind it?; Eight Principles of Chinese Unrestricted Warfare; The Challenge of Information Warfare; Chapter 4: Principles of warfare -- West versus East. | |
| 505 | 8 |
_6880-02 _aInformation Warfare: A new form of people's war ideas Guide Action; Information War Depends on the Integrity of the Information System; Chapter 6: Chinese CyberWarfare Doctrines; Chinese Cyberwarfare Doctrinal Development; Importance of Information Warfare; Goals of Chinese Information Warfare; Integrated Network Electronic Warfare (INEW); The 'Three Warfares' concept; The PRC's concept of 21st century warfare; Secrecy and Deception in PLA Military Strategy; Asymmetric Warfighting; Assassin's Mace Programs; Major General Dai Qingmin's Cyberwar; Conclusions. |
|
| 500 | _aTechnical Reconnaissance Bureaus (TRB). | ||
| 520 | _aMilitary doctrine of the People's Republic of China (PRC) envisages war being waged in five spheres: land, sea, air, outer space and cyberspace. The PRC believes that the early degradation, or destruction, of an enemy's command and control infrastructure will significantly improve its chances of ultimate victory. But the Chinese 21st century approach to cyberwarfare is both more sophisticated and comprehensive than that. This book examines the military background to today's doctrines, and explores how the teachings of Sun Tzu, the thirty-six principles from the warring states era and the hard-learnt lessons of Mao's long march infuse and support the modern state's approach to engaging with enemies and rivals. Chinese cyberwarriors, operating from behind the great firewall of China, have substantial campaign experience, and this book reviews operations from Titan Rain -- sustained multi-year cyberattacks against the US that started in 2003 -- to the most recent, ShadyRAT. This book also reviews the contributions made to the overall Chinese cyberstrategy by civilian hackers and state-owned enterprises and looks at how advanced persistent threats already undermine many of China's rival states and enterprises. China's rivals lack a coherent cyberstrategy of their own. They also do not understand the complex cultural, political and historical routes of the modern Chinese state and this is a significant weakness. This book helps everyone with an interest in cybersecurity to "know their enemy". | ||
| 588 | _aDescription based on print version record. | ||
| 650 | 0 |
_aCyberterrorism _xGovernment policy _zChina. _9642642 |
|
| 650 | 0 |
_aInformation warfare _xGovernment policy _zChina. _9642643 |
|
| 650 | 0 |
_aCyberspace _xGovernment policy _zChina. _9642644 |
|
| 650 | 0 |
_aComputer hackers _xGovernment policy _zChina. _9998839 |
|
| 650 | 0 |
_aInformation warfare _zChina. _9642646 |
|
| 650 | 0 |
_aInternet _xPolitical aspects _zChina. _9371328 |
|
| 650 | 0 |
_aInternet _xSocial aspects _zChina. _9447306 |
|
| 650 | 7 |
_aCOMPUTERS / Information Technology _2bisacsh _9188781 |
|
| 655 | 4 |
_aElectronic books. _9396 |
|
| 776 | 0 | 8 |
_iPrint version: _aHagestad, William T., II. _t21st century Chinese cyberwarfare. _dCambridgeshire [England] : IT Governance Pub., 2012 _z9781849283342 _w(OCoLC)769420458 |
| 856 | 4 | 0 |
_3EBSCOhost _uhttps://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=571552 |
| 880 | 8 |
_6505-01/$1 _aRules of Engagement: PLA's Information Dominance chapter 7: China's SIGINT Capabilities; China and information warfare (IW): Signals Intelligence (SIGINT), Electronic Warfare (EW) and Cyberwarfare (CW); The PLA SIGINT ground stations; Airborne SIGINT capabilities; Chinese Naval SIGINT Activities; Chinese PLA Electronic warfare; Airborne EW systems; Chapter 8: Chinese IW Capabilities; Assessing China's IW Capabilities; Chapter 9: The Chinese IW Organizational Structure; Key PLA Departments: Integrated Network Electronic Warfare (INEW); General Staff Department Third Department总参三部. |
|
| 880 | 8 |
_6505-02/$1 _aWarfare -- Mapping East to West'On War' -- Carl Von Clausewitz 1780 -1831 A.D.; 'The Art of War' -- Sun Tzu 544 -- 496 B.C.; Principles of Chinese Cyberwarfare -中国网络战的原则; The PLA's 制信息权 Information Dominance; Chinese Information War Theory and Implementation; Stratagems when in a superior position; Stratagems for confrontation; Stratagems for attack; Stratagems for attack; Stratagems for gaining cyberground; Stratagems for desperate situations; Chapter 5: Nature of Information warfare; Information Warfare; The IW Impact on Combat Concepts; The IW Impact on Organizational Structure. |
|
| 938 |
_aEBL - Ebook Library _bEBLB _nEBL918805 |
||
| 938 |
_aYBP Library Services _bYANK _n9241857 |
||
| 938 |
_aEBSCOhost _bEBSC _n571552 |
||
| 910 | _acpp1723AUTO | ||
| 994 |
_a02 _bN$T |
||
| 999 |
_c679627 _d679627 |
||