dc.contributor.author | Kozłowski, Andrzej | |
dc.contributor.editor | Mierzejewski, Dominik | |
dc.contributor.editor | Żakowski, Karol | |
dc.date.accessioned | 2015-10-15T09:42:57Z | |
dc.date.available | 2015-10-15T09:42:57Z | |
dc.date.issued | 2015 | |
dc.identifier.citation | The “Cyber Weapons Gap.” The Assessment of the China’s Cyber Warfare Capabilities and Its Consequences for Potential Conflict over Taiwan, [w:] On Their Own Paths. Japan and China Responses to the Global and Regional Challenges, eds. D. Mierzejewski, K. Żakowski, Łódź University Press, Łódź 2015, s. 161–174. | pl_PL |
dc.identifier.uri | http://hdl.handle.net/11089/12511 | |
dc.language.iso | en | pl_PL |
dc.publisher | Wydawnictwo Uniwersytetu Łódzkiego | pl_PL |
dc.relation.ispartof | “On Their Own Paths. Japan and China Responses to the Global and Regional Challenges”, eds. D. Mierzejewski, K. Żakowski, Łódź University Press, Łódź 2015; | |
dc.title | The “Cyber Weapons Gap.” The Assessment of the China’s Cyber Warfare Capabilities and Its Consequences for Potential Conflict over Taiwan | pl_PL |
dc.type | Book chapter | pl_PL |
dc.rights.holder | © Copyright by University of Łódź, Łódź 2015 | pl_PL |
dc.page.number | [171]-174 | pl_PL |
dc.contributor.authorAffiliation | University of Lodz | pl_PL |
dc.identifier.eisbn | 978-83-7969-812-7 | |
dc.references | Al Jazeera 2014, “South Korea says Chinese IP behind cyber attack,” viewed September 19, 2014, http://www.aljazeera.com/news/asia-pacifihtml. | pl_PL |
dc.references | Buczyński J 2014, “Chińska Republika Ludowa od wojny ludowo-wyzwoleńczej do cyberprzestrzeni,” in Górka M (ed.), Cyberbezpieczeństwo jako podstawa bezpiecznego państwa i społeczeństwa w XXI wieku, Wydawnictwo Difin, Warszawa, pp. 242–262. | pl_PL |
dc.references | Car J 2012, Inside Cyberwarfare, O’Reilly Media, Sebastopol. | pl_PL |
dc.references | CIA Factbook, “China,” viewed September 19, 2014, https://www.cia.gov/library/publications/the-world-factbook/geos/ch.html. | pl_PL |
dc.references | Dziwisz D 2013, “Rozmowa z dr. Martinem C. Libickim, ekspertem ds. bezpieczeństwa,” Bezpieczeństwo Narodowe, Vol. 26, No. 2, pp. 147–155. | pl_PL |
dc.references | Gawrycki F M 2003, Cyberterroryzm, Fundacja Studiów Międzynarodowych, Warszawa. | pl_PL |
dc.references | Gayathri A 2013, “Chinese Hackers Infiltrated European Ministries’ Computers Before G-20 Summit: Report,” viewed September 19, 2014, http://www.ibtimes.com/chinese-hackers-infisummit-report-1501924. | pl_PL |
dc.references | Harris S 2008, “China’s Cyber-Militia,” The National Journal, viewed September 19, 2014, http://www.nationaljournal.com/magazine/china-s-cyber-militia-20080531. | pl_PL |
dc.references | http://www.au.af.mil/au/awc/awcgate/china/09_04_30_infl_ops.pdf. | pl_PL |
dc.references | Inkster N 2012, “China in cyberspace,” in Reveron S R (ed.) Cyberspace and national security, Washington, pp. 191–207. | pl_PL |
dc.references | Kozłowski A 2014e, “Izrael jako cybermocarstwo,” FAE Policy Paper, No. 21/2014, viewed September 19, 2014, http://fae.pl/faepolicypaperpolitykaizraeljakocybermocarstwo.pdf. | pl_PL |
dc.references | Kozłowski A 2014c, “Nowa zimna wojna? Amerykańsko-chińskie relacje w cyberprzestrzeni,” in: Górka M (ed.) Cyberbezpieczeństwo jako podstawa bezpiecznego państwa i społeczeństwa w XXI wieku, Wydawnictwo Difi Warszawa, pp. 222–242. | pl_PL |
dc.references | Kozłowski A 2014b, “‘Żelazna Kopuła’ w rękach czerwonego smoka,” viewed September 19, 2014, http://www.defence24.pl/blog_zelazna-kopula-w-rekach-czerwonego-smoka. | pl_PL |
dc.references | Kozłowski A 2014a, “Chińscy hakerzy znowu w akcji,” viewed September 19, 2014, http://www.stosunki.pl/?q=content/chi%C5%84scy-hakerzy-znowu-w-akcji. | pl_PL |
dc.references | Kozłowski A 2014d, “LEAM Notes 15: The American Pivot to Asia in Cyberspace,” viewed September 19, 2014, http://leamplus.eu/leam-notes-15-the-american-pivot-to-asia-in-cyberspace/. | pl_PL |
dc.references | Mandiant 2013, “APT1. Exposing One of China’s Cyber Espionage Unit,” viewed September 19, 2014, http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf. | pl_PL |
dc.references | Marquand R & Arnoldy B 2007, “China’s Hacking Skills in Spotlight,” The Seattle Times, pp. 16–20. | pl_PL |
dc.references | McAfee 2014, “Revealed: Operation Shady RAT,” viewed September 19, 2014, http://www.mcafee.com/us/resources/white-papers/wp-operation-shady-rat.pdf. | pl_PL |
dc.references | McConnell M 2010, “Mike McConnell on how to win the cyber-war we’re Losing,” viewed September 19, 2014, http://www.washingtonpost.com/wp-dyn/content/article/2010/02/25/AR2010022502493.html. | pl_PL |
dc.references | Melvin L E 2005, Study of the Chinese People’s Liberation Army Military Region Headquarters Department Technical, Taiwan. | pl_PL |
dc.references | Mulvenon J 2004, “PLA Computer Network Operations: Scenarios, Doctrine, Organizations, and Capability,” viewed September 19, 2014, http://indianstrategicknowledgeonline.com/web/Ch_8-1.pdf. | pl_PL |
dc.references | Passeri P 2012, “Philippines and China, on The Edge of a New Cyber Conflict?,” viewed September 19, 2014, http://hackmageddon.com/2012/05/01/philippines-and-china-on-the-edge-of-a-new-cyber-conflict/. | pl_PL |
dc.references | Perlroth N 2013, “Hackers in China Attacked The Times for Last 4 Months,” viewed September 19, 2014, http://www.nytimes.com/2013/01/31/technology/chinese-hackers-infiltrate-new-york-times-computers.html?pagewanted=all&_r=0. | pl_PL |
dc.references | Pu P 2010, “PLA unveils nation’s first cyber center,” viewed September 19, 2014, http://www.globaltimes.cn/content/554647.shtml. | pl_PL |
dc.references | Qiao L & Xiangsui W 2009, Unrestricted Warfare, PLA Literature and Arts Publishing House, Beijing. | pl_PL |
dc.references | RSA 2011, “Anatomy of an Attack,” viewed September 19, 2014, https://blogs.rsa.com/anatomy-of-an-attack/. | pl_PL |
dc.references | Segal A 2012, “Chinese Computers Games,” Foreign Affairs, Vol. 91, No. 2, pp. 14–22. | pl_PL |
dc.references | Sheldon R 2011, “China’s Great Firewall and Situational Awarness,” Strategic Insights, Vol. 10, No. 2, pp. 36–51. | pl_PL |
dc.references | Singer W P & Friedman A 2014, Cybersecurity and Cyberwar. What everyone need to know, Oxford University Press, New York. | pl_PL |
dc.references | Stokes A M, Lin J & Hsiao L C R 2011, The Chinese People’s Liberation Army Signals Intelligence and Cyber Reconnaissance Infrastructure, Project 2049 Institute, Arlington. | pl_PL |
dc.references | Striennon R 2010, Surviving Cyberwar, The Scarecrow Press, Toronto. | pl_PL |
dc.references | The Globe and Mail 2014, “Chinese cyber attacks hit Japan over islands dispute,” viewed September 19, 2014, http://www.theglobeandmail.com/news/world/chinese-cyber-attacks-hit-japan-over-islands-dispute/article4553048/. | pl_PL |
dc.references | The US-China Economic and Security Review Commission 2009, “Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation,” viewed September 19, 2014, http://www2.gwu.edu/~nsarchiv/NSAEBB/NSAEBB424/docs/Cyber-030.pdf. | pl_PL |
dc.references | Thoma L T 2007, Decoding the Virtual Dragon, Foreign Military Studies Office, Fort Leavernworth. | pl_PL |
dc.references | TuoiTrens News, “Chinese hackers attack 745 Vietnam websites in a week: report,” viewed September 19, 2014, http://tuoitrenews.vn/business/22202/chinese-hackers-attack-745-vietnam-websites-in-a-week-report. | pl_PL |
dc.references | U.S.-China Economic And Security Review Commission 2009, “China’s Propaganda And Influence Operations, Its Intelligence Activities That Target The United States, And The Resulting Impacts On U.S. National Security,” viewed September 19, 2014, http://origin.www.uscc.gov/sites/default/firanscript.pdf. | pl_PL |
dc.references | Vance A 2010, “China Wrests Supercomputer Title From U.S.,” viewed September 19, 2014, http://www.nytimes.com/2010/10/28/technology/28compute.html?_r=0. | pl_PL |
dc.references | Weiguan S, Xijian J, Ji M & Jijin L 2005, China’s Information Warfare, China Xinhua Press, Beijing. | pl_PL |
dc.references | Węderska K 2014, “Cybernetyczny Pearl Harbor – mit czy rzeczywistość?,” in: Górka M (ed.) Cyberbezpieczeństwo jako podstawa bezpiecznego państwa i społeczeństwa w XXI wieku, Wydawnictwo Difin, Warszawa, pp. 62–81. | pl_PL |
dc.references | Wortzel M L 2014, The Chinese People’s Liberation Army and Information Warfare, United States Army War College Press, Carlisle. | pl_PL |
dc.references | Xinhua Publishing House 2000, “The Science of Military Strategy,” in: OSC, CPP20000517000168, Excerpt from “World War, The Third World War – Total Information Warfare”. | pl_PL |
dc.references | Zakaria F 2014, “China’s Cyberespionage Presents a 21st Century Challenge,” viewed September 19, 2014, http://www.washingtonpost.com/opinions/fareed-zakaria-chinas-cyberespionage-presents-a-21st-century-challenge/2014/05/22/5983aaa4-e1f3-11e3-9743-bb9b59cde7b9_story.html. | pl_PL |