語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Chinese Malware: Historical Perspect...
~
Utica College., Cybersecurity.
FindBook
Google Book
Amazon
博客來
Chinese Malware: Historical Perspective of Tactics and Methodologies Utilized to Steal Intellectual Property and Data.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Chinese Malware: Historical Perspective of Tactics and Methodologies Utilized to Steal Intellectual Property and Data./
作者:
Altamura, John M.
出版者:
Ann Arbor : ProQuest Dissertations & Theses, : 2020,
面頁冊數:
49 p.
附註:
Source: Masters Abstracts International, Volume: 82-07.
Contained By:
Masters Abstracts International82-07.
標題:
Computer science. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=28261718
ISBN:
9798557025553
Chinese Malware: Historical Perspective of Tactics and Methodologies Utilized to Steal Intellectual Property and Data.
Altamura, John M.
Chinese Malware: Historical Perspective of Tactics and Methodologies Utilized to Steal Intellectual Property and Data.
- Ann Arbor : ProQuest Dissertations & Theses, 2020 - 49 p.
Source: Masters Abstracts International, Volume: 82-07.
Thesis (M.S.)--Utica College, 2020.
This item must not be sold to any third party vendors.
The purpose of this research was to conduct a threat assessment of how the Chinese havedeveloped and utilized a variety of malware packages to steal intellectual property and data.Malicious malware is being researched, developed, and utilized by China to steal intellectualproperty and data. The nebulous nature of the Chinese cyberattack infrastructure makes itdifficult for the United States to mitigate malware threats, resulting in data and intellectualproperty theft. The Chinese utilized formal cyber espionage units via the People's LiberationArmy (PLA), authorized nonmilitary forces, and civilian forces to carry out offensive cyberoperations. Therefore, it is crucial to study the history, tactics, and methodologies utilized byChinese cyber espionage forces to ascertain potential mitigations deployed by the United Statesand others to protect valuable intellectual property and data. Keywords: Cybersecurity, ProfessorCarmen Mercado, Operation Aurora, The Chinese Dream, Mao Zedong, Spoofing, U.S. ChinaPhase One Trade Deal.
ISBN: 9798557025553Subjects--Topical Terms:
523869
Computer science.
Subjects--Index Terms:
Mao Zedong
Chinese Malware: Historical Perspective of Tactics and Methodologies Utilized to Steal Intellectual Property and Data.
LDR
:02205nmm a2200373 4500
001
2233037
005
20210628081330.5
008
210928s2020 ||||||||||||||||| ||eng d
020
$a
9798557025553
035
$a
(MiAaPQ)AAI28261718
035
$a
AAI28261718
035
$a
2233037
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Altamura, John M.
$3
3480639
245
1 0
$a
Chinese Malware: Historical Perspective of Tactics and Methodologies Utilized to Steal Intellectual Property and Data.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2020
300
$a
49 p.
500
$a
Source: Masters Abstracts International, Volume: 82-07.
500
$a
Advisor: Mercado, Carmen.
502
$a
Thesis (M.S.)--Utica College, 2020.
506
$a
This item must not be sold to any third party vendors.
520
$a
The purpose of this research was to conduct a threat assessment of how the Chinese havedeveloped and utilized a variety of malware packages to steal intellectual property and data.Malicious malware is being researched, developed, and utilized by China to steal intellectualproperty and data. The nebulous nature of the Chinese cyberattack infrastructure makes itdifficult for the United States to mitigate malware threats, resulting in data and intellectualproperty theft. The Chinese utilized formal cyber espionage units via the People's LiberationArmy (PLA), authorized nonmilitary forces, and civilian forces to carry out offensive cyberoperations. Therefore, it is crucial to study the history, tactics, and methodologies utilized byChinese cyber espionage forces to ascertain potential mitigations deployed by the United Statesand others to protect valuable intellectual property and data. Keywords: Cybersecurity, ProfessorCarmen Mercado, Operation Aurora, The Chinese Dream, Mao Zedong, Spoofing, U.S. ChinaPhase One Trade Deal.
590
$a
School code: 1754.
650
4
$a
Computer science.
$3
523869
650
4
$a
Asian history.
$2
bicssc
$3
1099323
650
4
$a
Pacific Rim studies.
$3
3168440
653
$a
Mao Zedong
653
$a
Operation Aurora
653
$a
The Chinese Dream
653
$a
U.S. China Phase One Trade Deal
690
$a
0984
690
$a
0332
690
$a
0561
710
2 0
$a
Utica College.
$b
Cybersecurity.
$3
2098218
773
0
$t
Masters Abstracts International
$g
82-07.
790
$a
1754
791
$a
M.S.
792
$a
2020
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=28261718
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9396947
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入