China's cyberwarfare capability
Saved in:
Corporate Author: | ebrary, Inc |
---|---|
Other Authors: | Marvel, Elisabette M. |
Format: | Electronic eBook |
Language: | English |
Published: |
New York :
Nova Science Publishers,
c2010.
|
Series: | China in the 21st century (Commack, N.Y.)
Computer science, technology and applications. |
Subjects: | |
Online Access: | An electronic book accessible through the World Wide Web; click to view |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Cybercrime and cyberwarfare /
by: Bernik, Igor
Published: (2014)
by: Bernik, Igor
Published: (2014)
Wars of disruption and resilience cybered conflict, power, and national security /
by: Demchak, Chris C.
Published: (2011)
by: Demchak, Chris C.
Published: (2011)
Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities
Published: (2009)
Published: (2009)
Cyberdeterrence and cyberwar
by: Libicki, Martin C.
Published: (2009)
by: Libicki, Martin C.
Published: (2009)
The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice /
by: Winterfeld, Steve
Published: (2013)
by: Winterfeld, Steve
Published: (2013)
Cyberwar-Netwar security in the information age /
Published: (2006)
Published: (2006)
The dark sides of the Internet : on cyber threats and information warfare /
by: Heickerö, Roland
Published: (2013)
by: Heickerö, Roland
Published: (2013)
Introduction to cyber-warfare a multidisciplinary approach /
by: Shakarian, Paulo
Published: (2013)
by: Shakarian, Paulo
Published: (2013)
Redefining information warfare boundaries for an Army in a wireless world
by: Porche, Isaac, 1968-
Published: (2013)
by: Porche, Isaac, 1968-
Published: (2013)
The People's Liberation Army in the information age
Published: (1999)
Published: (1999)
Cyber-threats, information warfare, and critical infrastructure protection defending the U.S. homeland /
by: Cordesman, Anthony H.
Published: (2002)
by: Cordesman, Anthony H.
Published: (2002)
Cyber security /
Published: (2014)
Published: (2014)
Cyber security and resiliency policy framework /
Published: (2014)
Published: (2014)
Introduction to communication electronic warfare systems
by: Poisel, Richard
Published: (2002)
by: Poisel, Richard
Published: (2002)
Cyber conflict competing national perspectives /
by: Ventre, Daniel
Published: (2012)
by: Ventre, Daniel
Published: (2012)
Advances in cyber security : technology, operations, and experiences /
Published: (2013)
Published: (2013)
Cyber warfare : techniques, tactics and tools for security practitioners /
by: Andress, Jason
Published: (2014)
by: Andress, Jason
Published: (2014)
The other quiet professionals : lessons for future cyber forces from the evolution of special forces /
by: Paul, Christopher, 1971-, et al.
Published: (2014)
by: Paul, Christopher, 1971-, et al.
Published: (2014)
Summary of discussions at a planning meeting on cyber-security and the insider threat to classified information
Published: (2000)
Published: (2000)
Proceedings of the 11th European Conference on Information Warfare and Security : The Institute Ecole Superieure en Informatique Electronique et Automatique, Laval, France, 5-6 July 2012 /
Published: (2012)
Published: (2012)
The U.S.-China military scorecard : forces, geography, and the evolving balance of power 1996- 2017 /
by: Heginbotham, Eric
Published: (2015)
by: Heginbotham, Eric
Published: (2015)
Information warfare /
by: Ventre, Daniel
Published: (2016)
by: Ventre, Daniel
Published: (2016)
Cyber blockades /
by: Russell, Alison Lawlor
Published: (2014)
by: Russell, Alison Lawlor
Published: (2014)
Aspects of network and information security
Published: (2008)
Published: (2008)
Proceedings of the 7th International Conference on Information Warfare and Security : Center for Information Assurance and Cybersecurity, University of Washington, Seattle, USA, 22-23 March 2012 /
Published: (2012)
Published: (2012)
Cybersecurity public sector threats and responses /
Published: (2012)
Published: (2012)
Information operations planning
by: Allen, Patrick D.
Published: (2007)
by: Allen, Patrick D.
Published: (2007)
Interpreting China's grand strategy past, present, and future /
by: Swaine, Michael D.
Published: (2000)
by: Swaine, Michael D.
Published: (2000)
China's quest for global order from peaceful rise to harmonious world /
by: Dellios, Rosita
Published: (2013)
by: Dellios, Rosita
Published: (2013)
China's military modernization building for regional and global reach /
by: Fisher, Richard D., 1959-
Published: (2008)
by: Fisher, Richard D., 1959-
Published: (2008)
Crisis and escalation in cyberspace /
by: Libicki, Martin C.
Published: (2012)
by: Libicki, Martin C.
Published: (2012)
Data visualization.
Published: (2013)
Published: (2013)
Safeguarding critical e-documents implementing a program for securing confidential information assets /
by: Smallwood, Robert F., 1959-
Published: (2012)
by: Smallwood, Robert F., 1959-
Published: (2012)
Cybersecurity today and tomorrow pay now or pay later /
Published: (2002)
Published: (2002)
Comprehensive approach as 'sine qua non' for critical infrastructure protection /
Published: (2015)
Published: (2015)
Information security governance simplified from the boardroom to the keyboard /
by: Fitzgerald, Todd
Published: (2012)
by: Fitzgerald, Todd
Published: (2012)
The basics of IT audit : purposes, processes, and practical information /
by: Gantz, Stephen D.
Published: (2014)
by: Gantz, Stephen D.
Published: (2014)
H4ckers5 wanted : an examination of the cybersecurity labor market /
by: Libicki, Martin C., et al.
Published: (2014)
by: Libicki, Martin C., et al.
Published: (2014)
Cyber threat! : how to manage the growing risk of cyber attacks /
by: Ulsch, N. MacDonnell, 1951-
Published: (2014)
by: Ulsch, N. MacDonnell, 1951-
Published: (2014)
Information technology for counterterrorism immediate actions and future possibilities /
Published: (2003)
Published: (2003)
Similar Items
-
Cybercrime and cyberwarfare /
by: Bernik, Igor
Published: (2014) -
Wars of disruption and resilience cybered conflict, power, and national security /
by: Demchak, Chris C.
Published: (2011) -
Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities
Published: (2009) -
Cyberdeterrence and cyberwar
by: Libicki, Martin C.
Published: (2009) -
The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice /
by: Winterfeld, Steve
Published: (2013)