| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910695858903321 |
|
|
Autore |
Scobell Andrew |
|
|
Titolo |
North Korea's military threat [[electronic resource] ] : Pyongyang's conventional forces, weapons of mass destruction, and ballistic missiles / / Andrew Scobell, John M. Sanford |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Carlisle, PA : , : Strategic Studies Institute, U.S. Army War College, , [2007] |
|
|
|
|
|
|
|
|
|
Descrizione fisica |
|
xiii, 177 pages : digital, PDF file |
|
|
|
|
|
|
Collana |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Soggetti |
|
Nuclear weapons - Korea (North) |
Weapons of mass destruction - Korea (North) |
Ballistic missiles - Korea (North) |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Title from title screen (viewed on May 23, 2007). |
"April 2007." |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910699129203321 |
|
|
Autore |
Krekel Bryan A |
|
|
Titolo |
Capability of the People's Republic of China to conduct cyber warfare and computer network exploitation [[electronic resource] /] / prepared for the US-China Economic and Security Review Commission ; principal author, Bryan Krekel |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
McLean, VA : , : Northrop Grumman Corp., Information Systems Sector, , [2009] |
|
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (88 pages) : color illustrations |
|
|
|
|
|
|
Soggetti |
|
Information warfare - China |
Computer networks - China |
China Military policy |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Title from PDF title page (USCC.gov, viewed Nov. 3, 2009). |
"October 9, 2009." |
|
|
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references. |
|
|
|
|
|
|
Nota di contenuto |
|
Executive summary -- Chinese computer network operations strategy -- Chinese computer network operations during conflict -- Key entities in Chinese computer network operations -- Cyber-espionage -- Operational profile of an advanced cyber intrusion -- Timeline of significant Chinese related cyber events 1999-present -- Chronology of alleged Chinese computer network exploitation events targeting US and foreign networks. |
|
|
|
|
|
|
|
| |