LEADER 03383nam 2200685 a 450 001 9910463207503321 005 20220222162523.0 010 $a1-61671-417-4 035 $a(CKB)2670000000370478 035 $a(EBL)3022258 035 $a(SSID)ssj0000872923 035 $a(PQKBManifestationID)12368889 035 $a(PQKBTitleCode)TC0000872923 035 $a(PQKBWorkID)10864100 035 $a(PQKB)11663879 035 $a(MiAaPQ)EBC3022258 035 $a(Au-PeEL)EBL3022258 035 $a(CaPaEBR)ebr10700435 035 $a(OCoLC)923668351 035 $a(EXLCZ)992670000000370478 100 $a20100726d2010 uy 0 101 0 $aeng 181 $ctxt 182 $cc 183 $acr 200 00$aChina's cyberwarfare capability 210 $aNew York $cNova Science Publishers$dc2010 215 $a1 online resource (115 p.) 225 1 $aChina in the 21st century 225 1 $aComputer science, technology and applications 300 $aDescription based upon print version of record. 320 $aIncludes bibliographical references and index. 327 $aCapability of the people's republic of China to conduct cyber warfare and computer network exploitation / Bryan Krekel ... [et al.] before the U.S.-China Economic and Security Review Commission -- China's approach to cyber operations : implications for the United States / Larry M. Wortzel Commissioner, U.S.-China Economic and Security Review Commission, Hearing on "The Google predicament : transforming U.S. cyberspace policy to advance democracy, Security and Trade". 330 $aThe government of the People's Republic of China (PRC) is a decade into a sweeping military modernisation program that has fundamentally transformed its ability to fight high tech wars. The Chinese military, using increasingly networked forces capable of communicating across service arms and among all echelons of command, is pushing beyond its traditional missions focused on Taiwan and toward a more regional defence posture. This book presents a comprehensive open source assessment of China's capability to conduct computer network operations (CNO) both during peacetime and periods of conflict, and will hopefully serve as a useful reference to policymakers, China specialists, and information operations professionals. 410 0$aChina in the 21st century (Commack, N.Y.) 410 0$aComputer science, technology and applications. 606 $aInformation warfare$zChina$2FBC 606 $aCyberspace$xSecurity measures$2FBC 606 $aInformation warfare$zUnited States$xPrevention$2FBC 606 $aComputer networks$xSecurity measures$zUnited States 606 $aInformationskrigsførelse$2FBC 606 $aSikkerhedspolitik$2FBC 607 $aChina$xMilitary policy 608 $aElectronic books. 615 0$aInformation warfare 615 0$aCyberspace$xSecurity measures. 615 0$aInformation warfare$xPrevention. 615 0$aComputer networks$xSecurity measures 615 7$aInformationskrigsførelse 615 7$aSikkerhedspolitik 686 $a355.4$2z 701 $aMarvel$b Elisabette M 701 $aMarvel$b Elisabette$01081843 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910463207503321 996 $aChina's cyberwarfare capability$92596814 997 $aUNINA