LEADER 01037nam0-22003611i-450- 001 990001484970403321 005 20090707153417.0 010 $a3-540-42082-7 035 $a000148497 035 $aFED01000148497 035 $a(Aleph)000148497FED01 035 $a000148497 100 $a20090707d2001----km-y0itay50------ba 101 0 $aeng 102 $aDE 105 $a----a---001yy 200 1 $aStatistical structure of quantum theory$fAlexander S. Holevo 210 $aBerlin [etc.]$cSpringer$dc2001 215 $aIX, 159 p.$d24 cm 225 1 $aLecture notes in physics$hNew series m$iMonographs$v67 610 0 $aMeccanica statistica 610 0 $aTeoria dei quanti 676 $a530.12 700 1$aHolevo,$bAlexander S.$028563 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990001484970403321 952 $a21-240F$bD.S.F. 7107$fFI1 952 $a10 B I 545$bDIEL 2845$fDINEL 959 $aFI1 959 $aDINEL 996 $aStatistical structure of quantum theory$9378269 997 $aUNINA LEADER 03129oam 2200745I 450 001 9910453190503321 005 20200520144314.0 010 $a0-415-82142-8 010 $a0-203-63017-3 010 $a1-135-95254-X 024 7 $a10.4324/9780203630174 035 $a(CKB)2550000001064107 035 $a(EBL)1215631 035 $a(OCoLC)851972175 035 $a(SSID)ssj0000890809 035 $a(PQKBManifestationID)12468378 035 $a(PQKBTitleCode)TC0000890809 035 $a(PQKBWorkID)10887442 035 $a(PQKB)10165795 035 $a(MiAaPQ)EBC1215631 035 $a(Au-PeEL)EBL1215631 035 $a(CaPaEBR)ebr10720664 035 $a(CaONFJC)MIL498578 035 $a(OCoLC)849936267 035 $a(OCoLC)860715810 035 $a(EXLCZ)992550000001064107 100 $a20180706d2013 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aChinese industrial espionage $etechnology acquisition and military modernisation /$fWilliam C. Hannas, James Mulvenon and Anna B. Puglisi 210 1$aAbingdon, Oxon :$cRoutledge,$d2013. 215 $a1 online resource (316 p.) 225 1 $aAsian security studies 225 0$aAsian security studies 300 $aDescription based upon print version of record. 311 $a0-415-82141-X 311 $a1-299-67328-7 320 $aIncludes bibliographical references and index. 327 $aCover; Title; Copyright; Contents; List of Illustrations; List of Abbreviations; Acknowledgments; Introduction; 1 China's History of Relying on Western Technology; 2 China's Use of Open Sources; 3 Trade For Technology; 4 PRC-based Technology Transfer Organizations; 5 US-based Technology Transfer Organizations; 6 China's Foreign Students in the United States; 7 Bringing Technology ""Back"" to China; 8 Traditional Chinese Espionage; 9 Chinese Cyber Espionage; 10 Chinese Industrial Espionage in Context; Conclusion; Appendix 1 Case Histories of Chinese Industrial Espionage 327 $aAppendix 2 Protecting against the China Cyber ThreatBibliography; Index 330 $a
Written by two of America's leading government analysts and an expert on Chinese cyber networks, this new book is the first full account, inside or outside government, of China's efforts to acquire foreign technology.
410 0$aAsian Security Studies 606 $aBusiness intelligence$zChina 606 $aBusiness intelligence$zUnited States 606 $aTechnology transfer$zChina 606 $aTechnology transfer$zUnited States 608 $aElectronic books. 615 0$aBusiness intelligence 615 0$aBusiness intelligence 615 0$aTechnology transfer 615 0$aTechnology transfer 676 $a338.6 700 $aHannas$b Wm. C.$f1946-,$0954872 701 $aMulvenon$b James C.$f1970-$0905737 701 $aPuglisi$b Anna B$0954873 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910453190503321 996 $aChinese industrial espionage$92159723 997 $aUNINA