Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book is the first one that comprehensively discusses cyberspace sovereignty in China, reflecting China’s clear attitude in the global Internet governance: respecting every nation’s right to independently choose a development path, cyber management modes and Internet public policies and to participate in the international cyberspace governance on an equal footing. At present, the concept of cyberspace sovereignty is still very strange to many people, so it needs to be thoroughly analyzed. This book will not only help scientific and technical workers in the field of cyberspace security,…mehr
This book is the first one that comprehensively discusses cyberspace sovereignty in China, reflecting China’s clear attitude in the global Internet governance: respecting every nation’s right to independently choose a development path, cyber management modes and Internet public policies and to participate in the international cyberspace governance on an equal footing.
At present, the concept of cyberspace sovereignty is still very strange to many people, so it needs to be thoroughly analyzed. This book will not only help scientific and technical workers in the field of cyberspace security, law researchers and the public understand the development of cyberspace sovereignty at home and abroad, but also serve as reference basis for the relevant decision-making and management departments in their work.
Professor Fang Binxing is academician of Chinese Academy of Engineering, Former President of Beijing University of Posts and Telecommunications, principal representative of the 11th National People's Congress, the expert of information network and information security. He was born in 1960, graduated from Harbin Institute of Technology with doctor degree in 1989. He used to work at the National University of Defense Technology as a Post Doctor. He once was appointed as the Director and Chief Engineer of National Computer Network and Information Security Management Center, the Coordination Office Director of National Computer Network Emergency Response Technical Team/Coordination Center of China, Chairman of the Science and Technology Committee of the National Computer Network and Information Security Management Center, senior Engineer with professor title and PhD Supervisor. His main research area covers network security, information content security, parallel processing, and internet technology and so on. He is the first inventor who proposed the conception to build China National Network and Information Security Infrastructure and designed the practical corresponding system. Therefore he has successively won a first prize and two second prizes of State Scientific and Technological Progress Award. In the area of information security theory, he gave a unified formalization definition of the information security concept which involves physical security, operation security (network security), data security (narrow definition of information security) and content security. At the same time he is conducting research on the computability of the information security attribute.
Inhaltsangabe
Chapter 1 The Definitions of Fundamental Concepts.- Chapter 2 Understanding of the Traditional Sovereignty Concept.- Chapter 3 Interpretation of the Concept of “Cyberspace Sovereignty”.- Chapter 4 Necessities for Advocating Cyberspace Sovereignty.- Chapter 5 The Relationship between Cyberspace Sovereignty and Internet Stakeholders.- Chapter 6 China’s Declaration of Cyberspace Sovereignty.- Chapter 7 Objective Existence of Cyberspace Sovereignty in Countries’ Affairs.- Chapter 8 Positions of States toward Cyberspace and Cyber-relating Regulations.- Chapter 9 Scientific Basis for Maintaining Cyberspace Sovereignty.- Chapter 10 Extension of Cyberspace Sovereignty.- Chapter 11 Conflicts of Cyberspace Sovereignty Concept.- Chapter 12 Main Initiatives to Safeguard Cyberspace Sovereignty.- Chapter 13 Conclusion.
Chapter 1 The Definitions of Fundamental Concepts.- Chapter 2 Understanding of the Traditional Sovereignty Concept.- Chapter 3 Interpretation of the Concept of "Cyberspace Sovereignty".- Chapter 4 Necessities for Advocating Cyberspace Sovereignty.- Chapter 5 The Relationship between Cyberspace Sovereignty and Internet Stakeholders.- Chapter 6 China's Declaration of Cyberspace Sovereignty.- Chapter 7 Objective Existence of Cyberspace Sovereignty in Countries' Affairs.- Chapter 8 Positions of States toward Cyberspace and Cyber-relating Regulations.- Chapter 9 Scientific Basis for Maintaining Cyberspace Sovereignty.- Chapter 10 Extension of Cyberspace Sovereignty.- Chapter 11 Conflicts of Cyberspace Sovereignty Concept.- Chapter 12 Main Initiatives to Safeguard Cyberspace Sovereignty.- Chapter 13 Conclusion.
Chapter 1 The Definitions of Fundamental Concepts.- Chapter 2 Understanding of the Traditional Sovereignty Concept.- Chapter 3 Interpretation of the Concept of “Cyberspace Sovereignty”.- Chapter 4 Necessities for Advocating Cyberspace Sovereignty.- Chapter 5 The Relationship between Cyberspace Sovereignty and Internet Stakeholders.- Chapter 6 China’s Declaration of Cyberspace Sovereignty.- Chapter 7 Objective Existence of Cyberspace Sovereignty in Countries’ Affairs.- Chapter 8 Positions of States toward Cyberspace and Cyber-relating Regulations.- Chapter 9 Scientific Basis for Maintaining Cyberspace Sovereignty.- Chapter 10 Extension of Cyberspace Sovereignty.- Chapter 11 Conflicts of Cyberspace Sovereignty Concept.- Chapter 12 Main Initiatives to Safeguard Cyberspace Sovereignty.- Chapter 13 Conclusion.
Chapter 1 The Definitions of Fundamental Concepts.- Chapter 2 Understanding of the Traditional Sovereignty Concept.- Chapter 3 Interpretation of the Concept of "Cyberspace Sovereignty".- Chapter 4 Necessities for Advocating Cyberspace Sovereignty.- Chapter 5 The Relationship between Cyberspace Sovereignty and Internet Stakeholders.- Chapter 6 China's Declaration of Cyberspace Sovereignty.- Chapter 7 Objective Existence of Cyberspace Sovereignty in Countries' Affairs.- Chapter 8 Positions of States toward Cyberspace and Cyber-relating Regulations.- Chapter 9 Scientific Basis for Maintaining Cyberspace Sovereignty.- Chapter 10 Extension of Cyberspace Sovereignty.- Chapter 11 Conflicts of Cyberspace Sovereignty Concept.- Chapter 12 Main Initiatives to Safeguard Cyberspace Sovereignty.- Chapter 13 Conclusion.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/neu