語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Chinese cybersecurity and defense
~
Ventre, Daniel.
FindBook
Google Book
Amazon
博客來
Chinese cybersecurity and defense
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Chinese cybersecurity and defense/ edited by Daniel Ventre.
其他作者:
Ventre, Daniel.
出版者:
London :ISTE, Ltd. ; : 2014.,
面頁冊數:
1 online resource (321 p.).
附註:
2.4. Key types of information operations.
內容註:
Cover; Title Page; Copyright; Contents; Author Biographies; Introduction; Chapter 1: China's Internet Development and Cybersecurity -- Policies and Practices; 1.1. Introduction; 1.2. Internet development in China: an overview; 1.3. China's policies towards Internet development; 1.3.1. From the very beginning of its development, China's Internet has been closely linked to the Chineseeconomy, and was programmed and integrated into itsmacro economic development blueprints.
內容註:
1.3.2. In addition to lending full policy support toInternet development, China also invests heavily inbuilding Internet infrastructures1.3.3. The Chinese government actively promotes theR & D of next-generation Internet (NGI); 1.3.4. China practices a policy of managing cyberaffairs in line with law, adhering to the principles ofscientific and effective administration in its Internetgovernance; 1.4. Cyber legislation and Internet administration; 1.4.1. Basic principles and practices of Internetadministration in China; 1.4.1.1. Laws and regulations on Internet administration.
內容註:
1.4.1.2. The leading role of the Chinese government in Internet administration1.4.1.3. Industry self-regulation; 1.4.1.4. Public supervision through special websites; 1.4.2. Guaranteeing the free and secure flow ofinformation in cyberspace; 1.4.2.1. Guaranteeing Citizens' Freedom of Speech on the Internet; 1.4.2.1.1. Constitutional guarantee; 1.4.2.1.2. Public supervision via the Internet; 1.4.2.1.3. CCDI website for public supervision; 1.4.2.1.4. Protecting citizens' online privacy; 1.4.2.1.5. Guaranteeing online safety for minors; 1.4.2.2. Protecting Internet Security.
內容註:
1.5. Cybersecurity and diplomacy: an international perspective1.5.1. Cyber policy dialogue and consultation; 1.5.2. Regional cyber cooperation; 1.5.3. Track II cyber diplomacy; 1.5.4. Legal cooperation in combating cybercrimes; 1.5.5. Technical cooperation; 1.5.5.1. CNCERT; 1.5.5.2. CNNIC; 1.5.5.3. ISC; 1.5.6. Office for Cyber Affairs of the MFA; 1.6. A cybersecurity strategy in the making?; 1.6.1. Significance of the Internet for China; 1.6.2. Goals and objectives; 1.6.3. Cyber threat landscape; 1.6.4. Means for strategic goals; 1.7. Conclusion.
內容註:
Chapter 2: PLA Views on Informationized Warfare, Information Warfare and Information Operations2.1. The evolution of chinese military thinking; 2.2. The growing importance of information; 2.3. Information operations; 2.3.1. Command and control missions; 2.3.2. Offensive information missions; 2.3.2.1. Information coercion/information deterrence; 2.3.2.2. Information blockade; 2.3.2.3. Information misdirection; 2.3.2.4. Information contamination; 2.3.2.5. Information paralysis; 2.3.3. Defensive information missions; 2.3.4. Information support and safeguarding missions.
標題:
Internet - Security measures - China. -
電子資源:
http://onlinelibrary.wiley.com/book/10.1002/9781119009009
ISBN:
9781119009009
Chinese cybersecurity and defense
Chinese cybersecurity and defense
[electronic resource] /edited by Daniel Ventre. - London :ISTE, Ltd. ;2014. - 1 online resource (321 p.). - ISTE. - ISTE..
2.4. Key types of information operations.
Includes bibliographical references and index.
Cover; Title Page; Copyright; Contents; Author Biographies; Introduction; Chapter 1: China's Internet Development and Cybersecurity -- Policies and Practices; 1.1. Introduction; 1.2. Internet development in China: an overview; 1.3. China's policies towards Internet development; 1.3.1. From the very beginning of its development, China's Internet has been closely linked to the Chineseeconomy, and was programmed and integrated into itsmacro economic development blueprints.
Cyberdefense has become, over the past five years, a major issue on the international scene. China, by the place it occupies, is the subject of attention: it is observed, criticized, and designated by many states as a major player in the global cyber-insecurity. The United States is building their cyberdefense strategy against what they call the ""Chinese threat."" It is therefore important to better understand today''s challenges related to cyber dimension in regard of the rise of China. Contributions from international researchers provide cross perspectives on China, its strate.
ISBN: 9781119009009Subjects--Topical Terms:
2149120
Internet
--Security measures--China.
LC Class. No.: TK5105.875.I57
Dewey Class. No.: 005.8
Chinese cybersecurity and defense
LDR
:05007cmm a2200493Ia 4500
001
2003676
003
OCoLC
005
20151106032841.0
006
m o d
007
cr |||||||||||
008
151223s2014 enk ob 001 0 eng d
020
$a
9781119009009
$q
(electronic bk.)
020
$a
1119009006
$q
(electronic bk.)
020
$a
9781119009016
$q
(electronic bk.)
020
$a
1119009014
$q
(electronic bk.)
020
$a
1848216149
$q
(Cloth)
020
$z
9781848216143
$q
(Cloth)
020
$a
1118814843
$q
(electronic bk.)
020
$a
9781118814840
$q
(electronic bk.)
020
$a
1118816102
$q
(electronic bk.)
020
$a
9781118816103
$q
(electronic bk.)
020
$a
1119009138
$q
(electronic bk.)
020
$a
9781119009139
$q
(electronic bk.)
020
$a
9781322060811
$q
(MyiLibrary)
020
$a
1322060819
$q
(MyiLibrary)
035
$a
(OCoLC)887507222
$z
(OCoLC)896605789
035
$a
ocn887507222
040
$a
EBLCP
$b
eng
$c
EBLCP
$d
IDEBK
$d
DG1
$d
N
$d
OCLCQ
$d
CDX
$d
YDXCP
$d
RECBK
$d
OCLCF
$d
DEBSZ
$d
OCLCO
$d
CUS
$d
OCLCQ
$d
OCLCO
$d
COO
$d
OCLCO
043
$a
a-cc---
050
4
$a
TK5105.875.I57
082
0 4
$a
005.8
$2
23
245
0 0
$a
Chinese cybersecurity and defense
$h
[electronic resource] /
$c
edited by Daniel Ventre.
260
$a
London :
$b
ISTE, Ltd. ;
$a
Hoboken :
$b
Wiley,
$c
2014.
300
$a
1 online resource (321 p.).
490
1
$a
ISTE
500
$a
2.4. Key types of information operations.
504
$a
Includes bibliographical references and index.
505
0
$a
Cover; Title Page; Copyright; Contents; Author Biographies; Introduction; Chapter 1: China's Internet Development and Cybersecurity -- Policies and Practices; 1.1. Introduction; 1.2. Internet development in China: an overview; 1.3. China's policies towards Internet development; 1.3.1. From the very beginning of its development, China's Internet has been closely linked to the Chineseeconomy, and was programmed and integrated into itsmacro economic development blueprints.
505
8
$a
1.3.2. In addition to lending full policy support toInternet development, China also invests heavily inbuilding Internet infrastructures1.3.3. The Chinese government actively promotes theR & D of next-generation Internet (NGI); 1.3.4. China practices a policy of managing cyberaffairs in line with law, adhering to the principles ofscientific and effective administration in its Internetgovernance; 1.4. Cyber legislation and Internet administration; 1.4.1. Basic principles and practices of Internetadministration in China; 1.4.1.1. Laws and regulations on Internet administration.
505
8
$a
1.4.1.2. The leading role of the Chinese government in Internet administration1.4.1.3. Industry self-regulation; 1.4.1.4. Public supervision through special websites; 1.4.2. Guaranteeing the free and secure flow ofinformation in cyberspace; 1.4.2.1. Guaranteeing Citizens' Freedom of Speech on the Internet; 1.4.2.1.1. Constitutional guarantee; 1.4.2.1.2. Public supervision via the Internet; 1.4.2.1.3. CCDI website for public supervision; 1.4.2.1.4. Protecting citizens' online privacy; 1.4.2.1.5. Guaranteeing online safety for minors; 1.4.2.2. Protecting Internet Security.
505
8
$a
1.5. Cybersecurity and diplomacy: an international perspective1.5.1. Cyber policy dialogue and consultation; 1.5.2. Regional cyber cooperation; 1.5.3. Track II cyber diplomacy; 1.5.4. Legal cooperation in combating cybercrimes; 1.5.5. Technical cooperation; 1.5.5.1. CNCERT; 1.5.5.2. CNNIC; 1.5.5.3. ISC; 1.5.6. Office for Cyber Affairs of the MFA; 1.6. A cybersecurity strategy in the making?; 1.6.1. Significance of the Internet for China; 1.6.2. Goals and objectives; 1.6.3. Cyber threat landscape; 1.6.4. Means for strategic goals; 1.7. Conclusion.
505
8
$a
Chapter 2: PLA Views on Informationized Warfare, Information Warfare and Information Operations2.1. The evolution of chinese military thinking; 2.2. The growing importance of information; 2.3. Information operations; 2.3.1. Command and control missions; 2.3.2. Offensive information missions; 2.3.2.1. Information coercion/information deterrence; 2.3.2.2. Information blockade; 2.3.2.3. Information misdirection; 2.3.2.4. Information contamination; 2.3.2.5. Information paralysis; 2.3.3. Defensive information missions; 2.3.4. Information support and safeguarding missions.
520
$a
Cyberdefense has become, over the past five years, a major issue on the international scene. China, by the place it occupies, is the subject of attention: it is observed, criticized, and designated by many states as a major player in the global cyber-insecurity. The United States is building their cyberdefense strategy against what they call the ""Chinese threat."" It is therefore important to better understand today''s challenges related to cyber dimension in regard of the rise of China. Contributions from international researchers provide cross perspectives on China, its strate.
588
$a
Description based on print version record.
650
0
$a
Internet
$x
Security measures
$z
China.
$3
2149120
650
0
$a
Internet
$z
China.
$3
740783
700
1
$a
Ventre, Daniel.
$3
2149119
830
0
$a
ISTE.
$3
2084372
856
4 0
$u
http://onlinelibrary.wiley.com/book/10.1002/9781119009009
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9271603
電子資源
11.線上閱覽_V
電子書
EB TK5105.875.I57
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入