Listing 1 - 8 of 8 |
Sort by
|
Choose an application
This book is the first one that comprehensively discusses cyberspace sovereignty in China, reflecting China’s clear attitude in the global Internet governance: respecting every nation’s right to independently choose a development path, cyber management modes and Internet public policies and to participate in the international cyberspace governance on an equal footing. At present, the concept of cyberspace sovereignty is still very strange to many people, so it needs to be thoroughly analyzed. This book will not only help scientific and technical workers in the field of cyberspace security, law researchers and the public understand the development of cyberspace sovereignty at home and abroad, but also serve as reference basis for the relevant decision-making and management departments in their work.
Criminology. Victimology --- Law --- Organization theory --- Production management --- Business management --- Computer architecture. Operating systems --- VR (virtual reality) --- veiligheid (mensen) --- informatica --- management --- informatietechnologie --- computerbeveiliging --- Management. --- Industrial management. --- Security, International. --- Computer security. --- Innovation/Technology Management. --- International Security Studies. --- Systems and Data Security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Collective security --- International security --- International relations --- Disarmament --- International organization --- Peace --- Business administration --- Business enterprises --- Corporate management --- Corporations --- Industrial administration --- Management, Industrial --- Rationalization of industry --- Scientific management --- Management --- Business --- Industrial organization --- Administration --- Industrial relations --- Organization --- Protection --- Security measures
Choose an application
This book is the first one that comprehensively discusses cyberspace sovereignty in China, reflecting China’s clear attitude in the global Internet governance: respecting every nation’s right to independently choose a development path, cyber management modes and Internet public policies and to participate in the international cyberspace governance on an equal footing. At present, the concept of cyberspace sovereignty is still very strange to many people, so it needs to be thoroughly analyzed. This book will not only help scientific and technical workers in the field of cyberspace security, law researchers and the public understand the development of cyberspace sovereignty at home and abroad, but also serve as reference basis for the relevant decision-making and management departments in their work.
Criminology. Victimology --- Law --- Organization theory --- Production management --- Business management --- Computer architecture. Operating systems --- VR (virtual reality) --- veiligheid (mensen) --- informatica --- management --- informatietechnologie --- computerbeveiliging
Choose an application
Choose an application
Choose an application
Choose an application
Choose an application
Choose an application
Listing 1 - 8 of 8 |
Sort by
|