China and cybersecurity : (Record no. 604648)

MARC details
000 -LEADER
fixed length control field 04046nam a2200445 i 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250919010719.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 160204t2015 nyu bi 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780190201272
Qualifying information paperback
Terms of availability RM150.37
039 #9 - LEVEL OF BIBLIOGRAPHIC CONTROL AND CODING DETAIL [OBSOLETE]
Level of rules in bibliographic description 201605171459
Level of effort used to assign nonsubject heading access points haiyati
Level of effort used to assign subject headings 201605101606
Level of effort used to assign classification lan
Level of effort used to assign subject headings 201605101603
Level of effort used to assign classification lan
Level of effort used to assign subject headings 201605101601
Level of effort used to assign classification lan
y 02-04-2016
z rahah
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Description conventions rda
Transcribing agency DLC
Modifying agency YDX
-- BTCTA
-- BDX
-- OCLCF
-- CDX
-- IUL
-- YUS
-- YDXCP
-- OCLCQ
-- UKM
Description conventions rda
043 ## - GEOGRAPHIC AREA CODE
Geographic area code a-cc---
-- n-us---
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (RLIN)
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) HV6773.15.C97C485
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (RLIN)
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) HV6773.15.C97
Local cutter number (OCLC) ; Book number/undivided call number, CALL (RLIN) C485
245 00 - TITLE STATEMENT
Title China and cybersecurity :
Remainder of title espionage, strategy, and politics in the digital domain /
Statement of responsibility, etc. edited by Jon R. Lindsay [and two others].
246 18 - VARYING FORM OF TITLE
Display text spine title :
Title proper/short title China and cybersecurity.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture New York :
Name of producer, publisher, distributor, manufacturer Oxford University Press,
Date of production, publication, distribution, manufacture, or copyright notice [2015].
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Date of production, publication, distribution, manufacture, or copyright notice ©2015.
300 ## - PHYSICAL DESCRIPTION
Extent xvii, 375 pages ;
Dimensions 25 cm.
336 ## - CONTENT TYPE
Content type term text
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Source rdacarrier
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc. 'China's emergence as a great power in the twenty-first century is strongly enabled by cyberspace. Leveraged information technology integrates Chinese firms into the global economy, modernizes infrastructure, and increases internet penetration which helps boost export-led growth. China's pursuit of'informatization' reconstructs industrial sectors and solidifies the transformation of the Chinese People's Liberation Army into a formidable regional power. Even as the government censors content online, China has one of the fastest growing internet populations and most of the technology is created and used by civilians. Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story. Chinese leaders are also concerned with cyber insecurity, and Chinese authors frequently note that China is also a victim of foreign cyber -- attacks -- predominantly from the United States. China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain is a comprehensive analysis of China's cyberspace threats and policies. The contributors -- Chinese specialists in cyber dynamics, experts on China, and experts on the use of information technology between China and the West -- address cyberspace threats and policies, emphasizing the vantage points of China and the U.S. on cyber exploitation and the possibilities for more positive coordination with the West. The volume's multi-disciplinary, cross-cultural approach does not pretend to offer wholesale resolutions. Contributors take different stances on how problems may be analyzed and reduced, and aim to inform the international audience of how China's political, economic, and security systems shape cyber activities. The compilation provides empirical and evaluative depth on the deepening dependence on shared global information infrastructure and the growing willingness to exploit it for political or economic gain'--
Assigning source Provided by publisher.
520 ## - SUMMARY, ETC.
Summary, etc. 'Examines cyberspace threats and policies from the vantage points of China and the U.S'--
Assigning source Provided by publisher.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cyberterrorism
Geographic subdivision China.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element National security
Geographic subdivision United States.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Security, International.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element International cooperation.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Lindsay, Jon R.,
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Cheung, Tai Ming,
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Reveron, Derek S.,
Relator term editor.
907 ## - LOCAL DATA ELEMENT G, LDG (RLIN)
a .b16270113
b 2019-11-12
c 2019-11-12
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type AM
Suppress in OPAC No
Call number prefix HV6773.15.C97C485
914 ## - VTLS Number
VTLS Number vtls003600067
990 ## - EQUIVALENCES OR CROSS-REFERENCES [LOCAL, CANADA]
Link information for 9XX fields rab
991 ## - LOCAL NOTE (NAMA FAKULTI/INSTITUT/PUSAT)
a Fakulti Sains Sosial dan Kemanusiaan
998 ## - LOCAL CONTROL INFORMATION (RLIN)
Library PERPUSTAKAAN TUN SERI LANANG
Operator's initials, OID (RLIN) 2016-04-02
Cataloger's initials, CIN (RLIN) m
Material Type (Sierra) Printed Books
Language English
Country
-- 0
-- .b16270113
Holdings
Withdrawn status Lost status Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Coded location qualifier Cost, normal purchase price Inventory number Total checkouts Total renewals Full call number Barcode Date last seen Copy number Price effective from Koha item type
        PERPUSTAKAAN TUN SERI LANANG PERPUSTAKAAN TUN SERI LANANG KOLEKSI AM-P. TUN SERI LANANG (ARAS 5) 12/11/2019 - 2 142.85 .i20832539 7 3 HV6773.15.C97C485 00002172567 18/09/2025 1 18/09/2025 AM

Contact Us

Perpustakaan Tun Seri Lanang, Universiti Kebangsaan Malaysia
43600 Bangi, Selangor Darul Ehsan,Malaysia
+603-89213446 – Consultation Services
019-2045652 – Telegram/Whatsapp
Email: helpdeskptsl@ukm.edu.my

Copyright ©The National University of Malaysia Library