Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Chinese Malware: Historical Perspect...
~
Utica College., Cybersecurity.
Linked to FindBook
Google Book
Amazon
博客來
Chinese Malware: Historical Perspective of Tactics and Methodologies Utilized to Steal Intellectual Property and Data.
Record Type:
Electronic resources : Monograph/item
Title/Author:
Chinese Malware: Historical Perspective of Tactics and Methodologies Utilized to Steal Intellectual Property and Data./
Author:
Altamura, John M.
Published:
Ann Arbor : ProQuest Dissertations & Theses, : 2020,
Description:
49 p.
Notes:
Source: Masters Abstracts International, Volume: 82-07.
Contained By:
Masters Abstracts International82-07.
Subject:
Computer science. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=28261718
ISBN:
9798557025553
Chinese Malware: Historical Perspective of Tactics and Methodologies Utilized to Steal Intellectual Property and Data.
Altamura, John M.
Chinese Malware: Historical Perspective of Tactics and Methodologies Utilized to Steal Intellectual Property and Data.
- Ann Arbor : ProQuest Dissertations & Theses, 2020 - 49 p.
Source: Masters Abstracts International, Volume: 82-07.
Thesis (M.S.)--Utica College, 2020.
This item must not be sold to any third party vendors.
The purpose of this research was to conduct a threat assessment of how the Chinese havedeveloped and utilized a variety of malware packages to steal intellectual property and data.Malicious malware is being researched, developed, and utilized by China to steal intellectualproperty and data. The nebulous nature of the Chinese cyberattack infrastructure makes itdifficult for the United States to mitigate malware threats, resulting in data and intellectualproperty theft. The Chinese utilized formal cyber espionage units via the People's LiberationArmy (PLA), authorized nonmilitary forces, and civilian forces to carry out offensive cyberoperations. Therefore, it is crucial to study the history, tactics, and methodologies utilized byChinese cyber espionage forces to ascertain potential mitigations deployed by the United Statesand others to protect valuable intellectual property and data. Keywords: Cybersecurity, ProfessorCarmen Mercado, Operation Aurora, The Chinese Dream, Mao Zedong, Spoofing, U.S. ChinaPhase One Trade Deal.
ISBN: 9798557025553Subjects--Topical Terms:
523869
Computer science.
Subjects--Index Terms:
Mao Zedong
Chinese Malware: Historical Perspective of Tactics and Methodologies Utilized to Steal Intellectual Property and Data.
LDR
:02205nmm a2200373 4500
001
2233037
005
20210628081330.5
008
210928s2020 ||||||||||||||||| ||eng d
020
$a
9798557025553
035
$a
(MiAaPQ)AAI28261718
035
$a
AAI28261718
035
$a
2233037
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Altamura, John M.
$3
3480639
245
1 0
$a
Chinese Malware: Historical Perspective of Tactics and Methodologies Utilized to Steal Intellectual Property and Data.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2020
300
$a
49 p.
500
$a
Source: Masters Abstracts International, Volume: 82-07.
500
$a
Advisor: Mercado, Carmen.
502
$a
Thesis (M.S.)--Utica College, 2020.
506
$a
This item must not be sold to any third party vendors.
520
$a
The purpose of this research was to conduct a threat assessment of how the Chinese havedeveloped and utilized a variety of malware packages to steal intellectual property and data.Malicious malware is being researched, developed, and utilized by China to steal intellectualproperty and data. The nebulous nature of the Chinese cyberattack infrastructure makes itdifficult for the United States to mitigate malware threats, resulting in data and intellectualproperty theft. The Chinese utilized formal cyber espionage units via the People's LiberationArmy (PLA), authorized nonmilitary forces, and civilian forces to carry out offensive cyberoperations. Therefore, it is crucial to study the history, tactics, and methodologies utilized byChinese cyber espionage forces to ascertain potential mitigations deployed by the United Statesand others to protect valuable intellectual property and data. Keywords: Cybersecurity, ProfessorCarmen Mercado, Operation Aurora, The Chinese Dream, Mao Zedong, Spoofing, U.S. ChinaPhase One Trade Deal.
590
$a
School code: 1754.
650
4
$a
Computer science.
$3
523869
650
4
$a
Asian history.
$2
bicssc
$3
1099323
650
4
$a
Pacific Rim studies.
$3
3168440
653
$a
Mao Zedong
653
$a
Operation Aurora
653
$a
The Chinese Dream
653
$a
U.S. China Phase One Trade Deal
690
$a
0984
690
$a
0332
690
$a
0561
710
2 0
$a
Utica College.
$b
Cybersecurity.
$3
2098218
773
0
$t
Masters Abstracts International
$g
82-07.
790
$a
1754
791
$a
M.S.
792
$a
2020
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=28261718
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9396947
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login