| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA990001089470203316 |
|
|
Autore |
CORNBLEET, Sandra |
|
|
Titolo |
The language of speech and writing / Sandra Cornbleet and Ronald Carter |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
London [etc.] : Routledge, 2001 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
IX, 129 p. : ill. ; 24 cm |
|
|
|
|
|
|
Collana |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Linguaggio - Analisi strutturale |
|
|
|
|
|
|
Collocazione |
|
IV.2. 896a(XII B 147 BIS) |
IV.2. 896b(XII B 147 A) |
IV.2. 896(XII B 147) |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910220138603321 |
|
|
Autore |
Harold Scott <1975-> |
|
|
Titolo |
Getting to yes with China in cyberspace / / Scott Warren Harold, Martin C. Libicki, Astrid Stuth Cevallos |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Santa Monica, California : , : RAND Corporation, , 2016 |
|
©2016 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (121 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Internet governance - China |
Internet governance - United States |
Computer crimes - China - Prevention |
Computer crimes - United States - Prevention |
Cyberterrorism - China - Prevention |
Cyberterrorism - United States - Prevention |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references. |
|
|
|
|
|
|
Nota di contenuto |
|
Cover ; Title Page ; Copyright ; Preface; Contents; Summary; Abbreviations; CHAPTER ONE: The "Cyber Problem" in U.S.-China Relations; Purpose and Approach; Organization of This Report; CHAPTER TWO: Coming to Terms; The Dimensions and Implications of Divergent Views of Deterrence; Sources of Difference; Elements of Difference; Law and Equality; The Application of Different Deterrence Approaches to Cyberspace; Hegemony; Attribution Versus the Correlation of Forces; Escalation; Stability; Signaling; Overall; CHAPTER THREE: Getting to Now; China's Cyber Espionage |
The 2011 U.S. International Strategy for CyberspaceMandiant, Snowden, and the PLA 5; Track Two Talks Between CICIR and CSIS; What Could the United States Do to Discourage China's EMCE?; CHAPTER FOUR: Getting to Yes?; Setting; Track One Negotiations; Economically Motivated Cyber Espionage; What Does China Want?; Alternatives to Bilateral Negotiations with China; The Law of Armed Conflict and the Right to Retaliate; A Mutual Forbearance Proposal; CHAPTER FIVE: Conclusions; Postscript; References |
|
|
|
|
|
|
|
| |