Breaching protocol : the threat of cyberespionage / Tim Stevens.
Material type: TextPublication details: 2010Subject(s): In: Jane's Intelligence Review Vol 22 No 3, March 2010, pp.8-13Summary: Study of China's information warfare capabilities which are said to be particularly strong in military and industrial areas. Also comments on the challenges posed by China's cyberwarfare developments.Item type | Current library | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
Journal Article | Mindef Library & Info Centre Journals | INFORMATION WARFARE (Browse shelf(Opens below)) | 1 | Not for loan | 31148-1001 |
Browsing Mindef Library & Info Centre shelves, Shelving location: Journals Close shelf browser (Hides shelf browser)
INFORMATION TECHNOLOGY The law of unintended consequences/ | INFORMATION TECHNOLOGY Next exit joint information environment/ | INFORMATION WARFARE War and PC/ | INFORMATION WARFARE Breaching protocol : the threat of cyberespionage / | INFORMATION WARFARE A treaty for cyberspace / | INFORMATION WARFARE War in the fifth domain. | INFORMATION WARFARE Warfighting in the Information Age: the Marine Corps Intelligence, Surveillance, and Reconnaissance Enterprise (MCISRE) / |
Study of China's information warfare capabilities which are said to be particularly strong in military and industrial areas. Also comments on the challenges posed by China's cyberwarfare developments.
There are no comments on this title.
Log in to your account to post a comment.