Pokaż uproszczony rekord

dc.contributor.authorKozłowski, Andrzej
dc.contributor.editorMierzejewski, Dominik
dc.contributor.editorŻakowski, Karol
dc.date.accessioned2015-10-15T09:42:57Z
dc.date.available2015-10-15T09:42:57Z
dc.date.issued2015
dc.identifier.citationThe “Cyber Weapons Gap.” The Assessment of the China’s Cyber Warfare Capabilities and Its Consequences for Potential Conflict over Taiwan, [w:] On Their Own Paths. Japan and China Responses to the Global and Regional Challenges, eds. D. Mierzejewski, K. Żakowski, Łódź University Press, Łódź 2015, s. 161–174.pl_PL
dc.identifier.urihttp://hdl.handle.net/11089/12511
dc.language.isoenpl_PL
dc.publisherWydawnictwo Uniwersytetu Łódzkiegopl_PL
dc.relation.ispartof“On Their Own Paths. Japan and China Responses to the Global and Regional Challenges”, eds. D. Mierzejewski, K. Żakowski, Łódź University Press, Łódź 2015;
dc.titleThe “Cyber Weapons Gap.” The Assessment of the China’s Cyber Warfare Capabilities and Its Consequences for Potential Conflict over Taiwanpl_PL
dc.typeBook chapterpl_PL
dc.rights.holder© Copyright by University of Łódź, Łódź 2015pl_PL
dc.page.number[171]-174pl_PL
dc.contributor.authorAffiliationUniversity of Lodzpl_PL
dc.identifier.eisbn978-83-7969-812-7
dc.referencesAl Jazeera 2014, “South Korea says Chinese IP behind cyber attack,” viewed September 19, 2014, http://www.aljazeera.com/news/asia-pacifihtml.pl_PL
dc.referencesBuczyński J 2014, “Chińska Republika Ludowa od wojny ludowo-wyzwoleńczej do cyberprzestrzeni,” in Górka M (ed.), Cyberbezpieczeństwo jako podstawa bezpiecznego państwa i społeczeństwa w XXI wieku, Wydawnictwo Difin, Warszawa, pp. 242–262.pl_PL
dc.referencesCar J 2012, Inside Cyberwarfare, O’Reilly Media, Sebastopol.pl_PL
dc.referencesCIA Factbook, “China,” viewed September 19, 2014, https://www.cia.gov/library/publications/the-world-factbook/geos/ch.html.pl_PL
dc.referencesDziwisz D 2013, “Rozmowa z dr. Martinem C. Libickim, ekspertem ds. bezpieczeństwa,” Bezpieczeństwo Narodowe, Vol. 26, No. 2, pp. 147–155.pl_PL
dc.referencesGawrycki F M 2003, Cyberterroryzm, Fundacja Studiów Międzynarodowych, Warszawa.pl_PL
dc.referencesGayathri A 2013, “Chinese Hackers Infiltrated European Ministries’ Computers Before G-20 Summit: Report,” viewed September 19, 2014, http://www.ibtimes.com/chinese-hackers-infisummit-report-1501924.pl_PL
dc.referencesHarris S 2008, “China’s Cyber-Militia,” The National Journal, viewed September 19, 2014, http://www.nationaljournal.com/magazine/china-s-cyber-militia-20080531.pl_PL
dc.referenceshttp://www.au.af.mil/au/awc/awcgate/china/09_04_30_infl_ops.pdf.pl_PL
dc.referencesInkster N 2012, “China in cyberspace,” in Reveron S R (ed.) Cyberspace and national security, Washington, pp. 191–207.pl_PL
dc.referencesKozłowski A 2014e, “Izrael jako cybermocarstwo,” FAE Policy Paper, No. 21/2014, viewed September 19, 2014, http://fae.pl/faepolicypaperpolitykaizraeljakocybermocarstwo.pdf.pl_PL
dc.referencesKozłowski A 2014c, “Nowa zimna wojna? Amerykańsko-chińskie relacje w cyberprzestrzeni,” in: Górka M (ed.) Cyberbezpieczeństwo jako podstawa bezpiecznego państwa i społeczeństwa w XXI wieku, Wydawnictwo Difi Warszawa, pp. 222–242.pl_PL
dc.referencesKozłowski A 2014b, “‘Żelazna Kopuła’ w rękach czerwonego smoka,” viewed September 19, 2014, http://www.defence24.pl/blog_zelazna-kopula-w-rekach-czerwonego-smoka.pl_PL
dc.referencesKozłowski A 2014a, “Chińscy hakerzy znowu w akcji,” viewed September 19, 2014, http://www.stosunki.pl/?q=content/chi%C5%84scy-hakerzy-znowu-w-akcji.pl_PL
dc.referencesKozłowski A 2014d, “LEAM Notes 15: The American Pivot to Asia in Cyberspace,” viewed September 19, 2014, http://leamplus.eu/leam-notes-15-the-american-pivot-to-asia-in-cyberspace/.pl_PL
dc.referencesMandiant 2013, “APT1. Exposing One of China’s Cyber Espionage Unit,” viewed September 19, 2014, http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf.pl_PL
dc.referencesMarquand R & Arnoldy B 2007, “China’s Hacking Skills in Spotlight,” The Seattle Times, pp. 16–20.pl_PL
dc.referencesMcAfee 2014, “Revealed: Operation Shady RAT,” viewed September 19, 2014, http://www.mcafee.com/us/resources/white-papers/wp-operation-shady-rat.pdf.pl_PL
dc.referencesMcConnell M 2010, “Mike McConnell on how to win the cyber-war we’re Losing,” viewed September 19, 2014, http://www.washingtonpost.com/wp-dyn/content/article/2010/02/25/AR2010022502493.html.pl_PL
dc.referencesMelvin L E 2005, Study of the Chinese People’s Liberation Army Military Region Headquarters Department Technical, Taiwan.pl_PL
dc.referencesMulvenon J 2004, “PLA Computer Network Operations: Scenarios, Doctrine, Organizations, and Capability,” viewed September 19, 2014, http://indianstrategicknowledgeonline.com/web/Ch_8-1.pdf.pl_PL
dc.referencesPasseri P 2012, “Philippines and China, on The Edge of a New Cyber Conflict?,” viewed September 19, 2014, http://hackmageddon.com/2012/05/01/philippines-and-china-on-the-edge-of-a-new-cyber-conflict/.pl_PL
dc.referencesPerlroth N 2013, “Hackers in China Attacked The Times for Last 4 Months,” viewed September 19, 2014, http://www.nytimes.com/2013/01/31/technology/chinese-hackers-infiltrate-new-york-times-computers.html?pagewanted=all&_r=0.pl_PL
dc.referencesPu P 2010, “PLA unveils nation’s first cyber center,” viewed September 19, 2014, http://www.globaltimes.cn/content/554647.shtml.pl_PL
dc.referencesQiao L & Xiangsui W 2009, Unrestricted Warfare, PLA Literature and Arts Publishing House, Beijing.pl_PL
dc.referencesRSA 2011, “Anatomy of an Attack,” viewed September 19, 2014, https://blogs.rsa.com/anatomy-of-an-attack/.pl_PL
dc.referencesSegal A 2012, “Chinese Computers Games,” Foreign Affairs, Vol. 91, No. 2, pp. 14–22.pl_PL
dc.referencesSheldon R 2011, “China’s Great Firewall and Situational Awarness,” Strategic Insights, Vol. 10, No. 2, pp. 36–51.pl_PL
dc.referencesSinger W P & Friedman A 2014, Cybersecurity and Cyberwar. What everyone need to know, Oxford University Press, New York.pl_PL
dc.referencesStokes A M, Lin J & Hsiao L C R 2011, The Chinese People’s Liberation Army Signals Intelligence and Cyber Reconnaissance Infrastructure, Project 2049 Institute, Arlington.pl_PL
dc.referencesStriennon R 2010, Surviving Cyberwar, The Scarecrow Press, Toronto.pl_PL
dc.referencesThe Globe and Mail 2014, “Chinese cyber attacks hit Japan over islands dispute,” viewed September 19, 2014, http://www.theglobeandmail.com/news/world/chinese-cyber-attacks-hit-japan-over-islands-dispute/article4553048/.pl_PL
dc.referencesThe US-China Economic and Security Review Commission 2009, “Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation,” viewed September 19, 2014, http://www2.gwu.edu/~nsarchiv/NSAEBB/NSAEBB424/docs/Cyber-030.pdf.pl_PL
dc.referencesThoma L T 2007, Decoding the Virtual Dragon, Foreign Military Studies Office, Fort Leavernworth.pl_PL
dc.referencesTuoiTrens News, “Chinese hackers attack 745 Vietnam websites in a week: report,” viewed September 19, 2014, http://tuoitrenews.vn/business/22202/chinese-hackers-attack-745-vietnam-websites-in-a-week-report.pl_PL
dc.referencesU.S.-China Economic And Security Review Commission 2009, “China’s Propaganda And Influence Operations, Its Intelligence Activities That Target The United States, And The Resulting Impacts On U.S. National Security,” viewed September 19, 2014, http://origin.www.uscc.gov/sites/default/firanscript.pdf.pl_PL
dc.referencesVance A 2010, “China Wrests Supercomputer Title From U.S.,” viewed September 19, 2014, http://www.nytimes.com/2010/10/28/technology/28compute.html?_r=0.pl_PL
dc.referencesWeiguan S, Xijian J, Ji M & Jijin L 2005, China’s Information Warfare, China Xinhua Press, Beijing.pl_PL
dc.referencesWęderska K 2014, “Cybernetyczny Pearl Harbor – mit czy rzeczywistość?,” in: Górka M (ed.) Cyberbezpieczeństwo jako podstawa bezpiecznego państwa i społeczeństwa w XXI wieku, Wydawnictwo Difin, Warszawa, pp. 62–81.pl_PL
dc.referencesWortzel M L 2014, The Chinese People’s Liberation Army and Information Warfare, United States Army War College Press, Carlisle.pl_PL
dc.referencesXinhua Publishing House 2000, “The Science of Military Strategy,” in: OSC, CPP20000517000168, Excerpt from “World War, The Third World War – Total Information Warfare”.pl_PL
dc.referencesZakaria F 2014, “China’s Cyberespionage Presents a 21st Century Challenge,” viewed September 19, 2014, http://www.washingtonpost.com/opinions/fareed-zakaria-chinas-cyberespionage-presents-a-21st-century-challenge/2014/05/22/5983aaa4-e1f3-11e3-9743-bb9b59cde7b9_story.html.pl_PL


Pliki tej pozycji

Thumbnail

Pozycja umieszczona jest w następujących kolekcjach

Pokaż uproszczony rekord