skip to content
Chinese cybersecurity and defense Preview this item
ClosePreview this item
Checking...

Chinese cybersecurity and defense

Author: Daniel Ventre
Publisher: London [England] ; Hoboken, New Jersey : ISTE : Wiley, 2014. ©2014
Series: Information systems, web and pervasive computing series.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
"The aim of this book is to analyze China's policies, strategies and practices in the area of cybersecurity and cyberdefense; and also to analyze the effect they have on the political and strategic choices made by other states. Contributions to this work have come from seven researchers, specializing in international relations and issues of cybersecurity. The individual chapters are drawn from a conference which  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Chinese cybersecurity and defense.
London, [England] ; Hoboken, New Jersey : ISTE : Wiley, ©2014
xviii, 301 pages
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Daniel Ventre
ISBN: 9781119009016 1119009014 9781119009009 1119009006 1118814843 9781118814840 1118816102 9781118816103 1119009138 9781119009139 9781322060811 1322060819
OCLC Number: 891396804
Notes: Includes index.
Description: 1 online resource (321 pages).
Contents: Cover; Title Page; Copyright; Contents; Author Biographies; Introduction; Chapter 1: China's Internet Development and Cybersecurity --
Policies and Practices; 1.1. Introduction; 1.2. Internet development in China: an overview; 1.3. China's policies towards Internet development; 1.3.1. From the very beginning of its development, China's Internet has been closely linked to the Chineseeconomy, and was programmed and integrated into itsmacro economic development blueprints. 1.3.2. In addition to lending full policy support toInternet development, China also invests heavily inbuilding Internet infrastructures1.3.3. The Chinese government actively promotes theR & D of next-generation Internet (NGI); 1.3.4. China practices a policy of managing cyberaffairs in line with law, adhering to the principles ofscientific and effective administration in its Internetgovernance; 1.4. Cyber legislation and Internet administration; 1.4.1. Basic principles and practices of Internetadministration in China; 1.4.1.1. Laws and regulations on Internet administration. 1.4.1.2. The leading role of the Chinese government in Internet administration1.4.1.3. Industry self-regulation; 1.4.1.4. Public supervision through special websites; 1.4.2. Guaranteeing the free and secure flow ofinformation in cyberspace; 1.4.2.1. Guaranteeing Citizens' Freedom of Speech on the Internet; 1.4.2.1.1. Constitutional guarantee; 1.4.2.1.2. Public supervision via the Internet; 1.4.2.1.3. CCDI website for public supervision; 1.4.2.1.4. Protecting citizens' online privacy; 1.4.2.1.5. Guaranteeing online safety for minors; 1.4.2.2. Protecting Internet Security. 1.5. Cybersecurity and diplomacy: an international perspective1.5.1. Cyber policy dialogue and consultation; 1.5.2. Regional cyber cooperation; 1.5.3. Track II cyber diplomacy; 1.5.4. Legal cooperation in combating cybercrimes; 1.5.5. Technical cooperation; 1.5.5.1. CNCERT; 1.5.5.2. CNNIC; 1.5.5.3. ISC; 1.5.6. Office for Cyber Affairs of the MFA; 1.6. A cybersecurity strategy in the making?; 1.6.1. Significance of the Internet for China; 1.6.2. Goals and objectives; 1.6.3. Cyber threat landscape; 1.6.4. Means for strategic goals; 1.7. Conclusion. Chapter 2: PLA Views on Informationized Warfare, Information Warfare and Information Operations2.1. The evolution of chinese military thinking; 2.2. The growing importance of information; 2.3. Information operations; 2.3.1. Command and control missions; 2.3.2. Offensive information missions; 2.3.2.1. Information coercion/information deterrence; 2.3.2.2. Information blockade; 2.3.2.3. Information misdirection; 2.3.2.4. Information contamination; 2.3.2.5. Information paralysis; 2.3.3. Defensive information missions; 2.3.4. Information support and safeguarding missions.
Series Title: Information systems, web and pervasive computing series.
Responsibility: edited by Daniel Ventre.

Abstract:

Cyberdefense has become, over the past five years, a major issue on the international scene. China, by the place it occupies, is the subject of attention: it is observed, criticized, and designated  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/891396804> # Chinese cybersecurity and defense
    a schema:CreativeWork, schema:Book, schema:MediaObject ;
    library:oclcnum "891396804" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/enk> ;
    schema:about <http://dewey.info/class/005.8/e23/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/1852907654#Topic/internet_security_measures> ; # Internet--Security measures
    schema:about <http://experiment.worldcat.org/entity/work/data/1852907654#Topic/computer_security> ; # Computer security
    schema:about <http://experiment.worldcat.org/entity/work/data/1852907654#Topic/computers_internet_security> ; # COMPUTERS--Internet--Security
    schema:bookFormat schema:EBook ;
    schema:copyrightYear "2014" ;
    schema:datePublished "2014" ;
    schema:description ""The aim of this book is to analyze China's policies, strategies and practices in the area of cybersecurity and cyberdefense; and also to analyze the effect they have on the political and strategic choices made by other states. Contributions to this work have come from seven researchers, specializing in international relations and issues of cybersecurity. The individual chapters are drawn from a conference which took place in Paris, on 1 July 2013, organized by the Chair of Cyberdefense and Cybersecurity (Saint-Cyr / Sogeti / Thales)."--"@en ;
    schema:description "Cover; Title Page; Copyright; Contents; Author Biographies; Introduction; Chapter 1: China's Internet Development and Cybersecurity -- Policies and Practices; 1.1. Introduction; 1.2. Internet development in China: an overview; 1.3. China's policies towards Internet development; 1.3.1. From the very beginning of its development, China's Internet has been closely linked to the Chineseeconomy, and was programmed and integrated into itsmacro economic development blueprints."@en ;
    schema:editor <http://experiment.worldcat.org/entity/work/data/1852907654#Person/ventre_daniel> ; # Daniel Ventre
    schema:exampleOfWork <http://worldcat.org/entity/work/id/1852907654> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/1852907654#Series/information_systems_web_and_pervasive_computing_series> ; # Information systems, web and pervasive computing series.
    schema:isSimilarTo <http://worldcat.org/entity/work/data/1852907654#CreativeWork/chinese_cybersecurity_and_defense> ;
    schema:name "Chinese cybersecurity and defense"@en ;
    schema:productID "891396804" ;
    schema:url <http://ebookcentral.proquest.com/lib/macewan-ebooks/detail.action?docID=1765106> ;
    schema:url <http://ebookcentral.proquest.com/lib/gprc-ebooks/detail.action?docID=1765106> ;
    schema:url <http://ebookcentral.proquest.com/lib/norquest-ebooks/detail.action?docID=1765106> ;
    schema:url <http://onlinelibrary.wiley.com/book/10.1002/9781119009009> ;
    schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=829073> ;
    schema:url <http://www.books24x7.com/marc.asp?bookid=63491> ;
    schema:url <http://ebookcentral.proquest.com/lib/warw/detail.action?docID=1765106> ;
    schema:url <http://catalogimages.wiley.com/images/db/jimages/9781848216143.jpg> ;
    schema:url <http://ebookcentral.proquest.com/lib/ucm/detail.action?docID=1765106> ;
    schema:url <http://rbdigital.oneclickdigital.com> ;
    schema:url <http://ebookcentral.proquest.com/lib/rdc/detail.action?docID=1765106> ;
    schema:url <http://ebookcentral.proquest.com/lib/oldscollege/detail.action?docID=1765106> ;
    schema:url <http://proquest.safaribooksonline.com/9781119009139> ;
    schema:url <http://dx.doi.org/10.1002/9781119009009> ;
    schema:url <http://ebookcentral.proquest.com/lib/concordiaab-ebooks/detail.action?docID=1765106> ;
    schema:url <http://site.ebrary.com/id/10907568> ;
    schema:url <http://www.myilibrary.com?id=637332> ;
    schema:url <http://ebookcentral.proquest.com/lib/columbia/detail.action?docID=1765106> ;
    schema:workExample <http://worldcat.org/isbn/9781119009016> ;
    schema:workExample <http://worldcat.org/isbn/9781118816103> ;
    schema:workExample <http://worldcat.org/isbn/9781119009009> ;
    schema:workExample <http://worldcat.org/isbn/9781119009139> ;
    schema:workExample <http://worldcat.org/isbn/9781322060811> ;
    schema:workExample <http://worldcat.org/isbn/9781118814840> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/891396804> ;
    .


Related Entities

<http://ebookcentral.proquest.com/lib/concordiaab-ebooks/detail.action?docID=1765106>
    rdfs:comment "from Ebook Central Academic Complete" ;
    rdfs:comment "(Unlimited Concurrent Users)" ;
    .

<http://ebookcentral.proquest.com/lib/gprc-ebooks/detail.action?docID=1765106>
    rdfs:comment "from Ebook Central Academic Complete" ;
    rdfs:comment "(Unlimited Concurrent Users)" ;
    .

<http://ebookcentral.proquest.com/lib/macewan-ebooks/detail.action?docID=1765106>
    rdfs:comment "from Ebook Central Academic Complete" ;
    rdfs:comment "(Unlimited Concurrent Users)" ;
    .

<http://ebookcentral.proquest.com/lib/oldscollege/detail.action?docID=1765106>
    rdfs:comment "from Ebook Central College Complete" ;
    .

<http://ebookcentral.proquest.com/lib/rdc/detail.action?docID=1765106>
    rdfs:comment "from Ebook Central Academic Complete" ;
    rdfs:comment "(Unlimited Concurrent Users)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1852907654#Person/ventre_daniel> # Daniel Ventre
    a schema:Person ;
    schema:familyName "Ventre" ;
    schema:givenName "Daniel" ;
    schema:name "Daniel Ventre" ;
    .

<http://experiment.worldcat.org/entity/work/data/1852907654#Series/information_systems_web_and_pervasive_computing_series> # Information systems, web and pervasive computing series.
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/891396804> ; # Chinese cybersecurity and defense
    schema:name "Information systems, web and pervasive computing series." ;
    schema:name "Information Systems, Web and Pervasive Computing Series" ;
    .

<http://experiment.worldcat.org/entity/work/data/1852907654#Topic/computer_security> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1852907654#Topic/computers_internet_security> # COMPUTERS--Internet--Security
    a schema:Intangible ;
    schema:name "COMPUTERS--Internet--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1852907654#Topic/internet_security_measures> # Internet--Security measures
    a schema:Intangible ;
    schema:name "Internet--Security measures"@en ;
    .

<http://onlinelibrary.wiley.com/book/10.1002/9781119009009>
    rdfs:comment "URL des Erstveröffentlichers" ;
    .

<http://worldcat.org/entity/work/data/1852907654#CreativeWork/chinese_cybersecurity_and_defense>
    a schema:CreativeWork ;
    rdfs:label "Chinese cybersecurity and defense." ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/891396804> ; # Chinese cybersecurity and defense
    .

<http://worldcat.org/isbn/9781118814840>
    a schema:ProductModel ;
    schema:isbn "1118814843" ;
    schema:isbn "9781118814840" ;
    .

<http://worldcat.org/isbn/9781118816103>
    a schema:ProductModel ;
    schema:isbn "1118816102" ;
    schema:isbn "9781118816103" ;
    .

<http://worldcat.org/isbn/9781119009009>
    a schema:ProductModel ;
    schema:isbn "1119009006" ;
    schema:isbn "9781119009009" ;
    .

<http://worldcat.org/isbn/9781119009016>
    a schema:ProductModel ;
    schema:isbn "1119009014" ;
    schema:isbn "9781119009016" ;
    .

<http://worldcat.org/isbn/9781119009139>
    a schema:ProductModel ;
    schema:isbn "1119009138" ;
    schema:isbn "9781119009139" ;
    .

<http://worldcat.org/isbn/9781322060811>
    a schema:ProductModel ;
    schema:isbn "1322060819" ;
    schema:isbn "9781322060811" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.