Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Cybersecurity in Chinathe next wave /
~
Austin, Greg.
Cybersecurity in Chinathe next wave /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Cybersecurity in Chinaby Greg Austin.
Reminder of title:
the next wave /
Author:
Austin, Greg.
Published:
Cham :Springer International Publishing :2018.
Description:
xxi, 130 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
Subject:
Computer securityChina.
Online resource:
http://dx.doi.org/10.1007/978-3-319-68436-9
ISBN:
9783319684369$q(electronic bk.)
Cybersecurity in Chinathe next wave /
Austin, Greg.
Cybersecurity in China
the next wave /[electronic resource] :by Greg Austin. - Cham :Springer International Publishing :2018. - xxi, 130 p. :ill., digital ;24 cm. - SpringerBriefs in cybersecurity,2193-973X. - SpringerBriefs in cybersecurity..
Preface -- The Cybersecurity Ecosystem -- Education in Cyber Security- Chinese Views of the Cyber Industrial Complex -- Corporate Cyber Security -- Cyber Insecurity.of Chinese Citizens- Governmental Cybersecurity -- Grading National Cybersecurity -- The Next Wave.
This book offers the first benchmarking study of China's response to the problems of security in cyber space. There are several useful descriptive books on cyber security policy in China published between 2010 and 2016. As a result, we know quite well the system for managing cyber security in China, and the history of policy responses. What we don't know so well, and where this book is useful, is how capable China has become in this domain relative to the rest of the world. This book is a health check, a report card, on China's cyber security system in the face of escalating threats from criminal gangs and hostile states. The book also offers an assessment of the effectiveness of China's efforts. It lays out the major gaps and shortcomings in China's cyber security policy. It is the first book to base itself around an assessment of China's cyber industrial complex, concluding that China does not yet have one. As Xi Jinping said in July 2016, the country's core technologies are dominated by foreigners.
ISBN: 9783319684369$q(electronic bk.)
Standard No.: 10.1007/978-3-319-68436-9doiSubjects--Topical Terms:
815728
Computer security
--China.
LC Class. No.: QA76.9.M3
Dewey Class. No.: 005.8
Cybersecurity in Chinathe next wave /
LDR
:02313nmm a2200349 a 4500
001
538620
003
DE-He213
005
20180515073441.0
006
m d
007
cr nn 008maaau
008
190122s2018 gw s 0 eng d
020
$a
9783319684369$q(electronic bk.)
020
$a
9783319684352$q(paper)
024
7
$a
10.1007/978-3-319-68436-9
$2
doi
035
$a
978-3-319-68436-9
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.M3
072
7
$a
UYZM
$2
bicssc
072
7
$a
UKR
$2
bicssc
072
7
$a
BUS083000
$2
bisacsh
072
7
$a
COM032000
$2
bisacsh
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.M3
$b
A935 2018
100
1
$a
Austin, Greg.
$3
815727
245
1 0
$a
Cybersecurity in China
$h
[electronic resource] :
$b
the next wave /
$c
by Greg Austin.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2018.
300
$a
xxi, 130 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
SpringerBriefs in cybersecurity,
$x
2193-973X
505
0
$a
Preface -- The Cybersecurity Ecosystem -- Education in Cyber Security- Chinese Views of the Cyber Industrial Complex -- Corporate Cyber Security -- Cyber Insecurity.of Chinese Citizens- Governmental Cybersecurity -- Grading National Cybersecurity -- The Next Wave.
520
$a
This book offers the first benchmarking study of China's response to the problems of security in cyber space. There are several useful descriptive books on cyber security policy in China published between 2010 and 2016. As a result, we know quite well the system for managing cyber security in China, and the history of policy responses. What we don't know so well, and where this book is useful, is how capable China has become in this domain relative to the rest of the world. This book is a health check, a report card, on China's cyber security system in the face of escalating threats from criminal gangs and hostile states. The book also offers an assessment of the effectiveness of China's efforts. It lays out the major gaps and shortcomings in China's cyber security policy. It is the first book to base itself around an assessment of China's cyber industrial complex, concluding that China does not yet have one. As Xi Jinping said in July 2016, the country's core technologies are dominated by foreigners.
650
0
$a
Computer security
$z
China.
$3
815728
650
0
$a
Computer security
$x
Study and teaching.
$3
815729
650
1 4
$a
Computer Science.
$3
212513
650
2 4
$a
Management of Computing and Information Systems.
$3
274191
650
2 4
$a
Public Policy.
$3
224661
650
2 4
$a
International Criminal Law.
$3
558688
650
2 4
$a
Electronics and Microelectronics, Instrumentation.
$3
274412
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
830
0
$a
SpringerBriefs in cybersecurity.
$3
561564
856
4 0
$u
http://dx.doi.org/10.1007/978-3-319-68436-9
950
$a
Computer Science (Springer-11645)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000158087
電子館藏
1圖書
電子書
EB QA76.9.M3 A935 2018
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
http://dx.doi.org/10.1007/978-3-319-68436-9
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login