Gotowa bibliografia na temat „Great Firewall”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Great Firewall”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Great Firewall"
Jagani, Aishwarya. "India’s Great Firewall". Index on Censorship 52, nr 1 (kwiecień 2023): 68–71. http://dx.doi.org/10.1177/03064220231165392.
Pełny tekst źródłaMulvenon, James C., i Michael S. Chase. "Breaching the Great Firewall". Journal of E-Government 2, nr 4 (31.07.2006): 73–84. http://dx.doi.org/10.1300/j399v02n04_05.
Pełny tekst źródłaZhang, Lena L. "Behind the ‘Great Firewall’". Convergence: The International Journal of Research into New Media Technologies 12, nr 3 (sierpień 2006): 271–91. http://dx.doi.org/10.1177/1354856506067201.
Pełny tekst źródłaLiu, Jingqing. "Enhancing Network Security Through Router-Based Firewalls: An Investigation into Design, Effectiveness, and Human Factors". Highlights in Science, Engineering and Technology 85 (13.03.2024): 724–32. http://dx.doi.org/10.54097/axrsnb71.
Pełny tekst źródłaHughes, Christopher R. "Google and the Great Firewall". Survival 52, nr 2 (25.03.2010): 19–26. http://dx.doi.org/10.1080/00396331003764538.
Pełny tekst źródłaScarfe-James, Rose. "Chinese voices behind ‘The Great Firewall’". Groundings Undergraduate 6 (1.04.2013): 75–86. http://dx.doi.org/10.36399/groundingsug.6.229.
Pełny tekst źródłaManaseer, Saher, Ahmad K. Al Hwaitat i Riad Jabri. "Distributed Detection and prevention of Web Threats in Heterogeneous Environment". Modern Applied Science 12, nr 10 (9.09.2018): 13. http://dx.doi.org/10.5539/mas.v12n10p13.
Pełny tekst źródłaTsuchiya, Akihiro, Francisco Fraile, Ichiro Koshijima, Angel Ortiz i Raul Poler. "Software defined networking firewall for industry 4.0 manufacturing systems". Journal of Industrial Engineering and Management 11, nr 2 (6.04.2018): 318. http://dx.doi.org/10.3926/jiem.2534.
Pełny tekst źródłaEnsafi, Roya, Philipp Winter, Abdullah Mueen i Jedidiah R. Crandall. "Analyzing the Great Firewall of China Over Space and Time". Proceedings on Privacy Enhancing Technologies 2015, nr 1 (1.04.2015): 61–76. http://dx.doi.org/10.1515/popets-2015-0005.
Pełny tekst źródłaAnderson, Daniel. "Splinternet Behind the Great Firewall of China". Queue 10, nr 11 (listopad 2012): 40–49. http://dx.doi.org/10.1145/2390756.2405036.
Pełny tekst źródłaRozprawy doktorskie na temat "Great Firewall"
Seiwald, Michael. "A detailed analysis of the follow-up scanning performed by the Great Firewall of China". Thesis, Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-26523.
Pełny tekst źródłaLovito, Monica. "Informazione in Cina fra ieri e oggi: media, netizen e l'apertura al mondo". Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amslaurea.unibo.it/8200/.
Pełny tekst źródłaHsiao, Yu-Hsuan, i 蕭宇軒. "In and Out of the Great Firewall of China: Taiwanese Exchange Students’ Practices of Internet Usage". Thesis, 2016. http://ndltd.ncl.edu.tw/handle/j8juu9.
Pełny tekst źródła國立臺灣師範大學
大眾傳播研究所
105
Abstract This thesis explores Taiwanese exchange students’ Internet practices while exchanging in China. Facing the Internet regulation and the peculiar Internet context, Taiwanese exchange students need to change their existing Internet practices in Taiwan. Hence, by conducting field research with in-depth interviews and online date, I try to document Taiwanese exchange students’ strategies, including bypassing the great firewall of China, and its meanings for Taiwanese exchange students. The findings are divided into three sections. First, network capital and economic capital influence how Taiwanese exchange students find the useful and stable way to bypass the great firewall of China. Taiwanese exchange students would use the tactics and wait the impeccable moment to successfully bypass the great firewall of China. Second, Taiwanese exchange students bypass the great firewall of China to find information in accordance with their habitus, cultural capital or communicate with their established interpersonal network in Taiwan. At the meantime, combining online and offline space, bypassing the wall makes students regain their private space as if they were in Taiwan. Third, the experiences and reasons that Taiwanese exchange students use Chinese Internet channels. In conclusion, the great firewall of China should be considered an opportunity for experiments. The value of ‘Now-ness’ is sometimes ignored while the quotidian practice of internet usage. But it becomes visible when Taiwanese exchange students can hardly practice their existing habits in China. The ways Taiwanese exchange students try to break through the internet restrictions reveal the value of internet is to break the spatiotemporal restrictions and satisfy the desires for communication and information.
Książki na temat "Great Firewall"
Li, Yonggang. Wo men de fang huo shan: Wang luo shi dai de biao da yu jian guan = Our great firewall : Expression and governance in the era of the internet. Wyd. 8. Guilin Shi: Guangxi shi fan da xue chu ban she, 2009.
Znajdź pełny tekst źródłaRoberts, Margaret E. Censored: Distraction and Diversion Inside China's Great Firewall. Princeton University Press, 2018.
Znajdź pełny tekst źródłaNelson, K. B. Children of the Great Reckoning: Firewall, Book 1. Karunajoythi Books, 2013.
Znajdź pełny tekst źródłaRoberts, Margaret E. Censored: Distraction and Diversion Inside China's Great Firewall. Princeton University Press, 2020.
Znajdź pełny tekst źródłaRoberts, Margaret E. Censored: Distraction and Diversion Inside China's Great Firewall. Princeton University Press, 2018.
Znajdź pełny tekst źródłaGriffiths, James. Great Firewall of China: How to Build and Control an Alternative Version of the Internet. Zed Books, Limited, 2021.
Znajdź pełny tekst źródłaGriffiths, James. Great Firewall of China: How to Build and Control an Alternative Version of the Internet. Zed Books, Limited, 2021.
Znajdź pełny tekst źródłaGriffiths, James. Great Firewall of China: How to Build and Control an Alternate Vision of the Internet. Zed Books, Limited, 2019.
Znajdź pełny tekst źródłaGriffith, James. Great Firewall of China: How to Build and Control an Alternate Vision of the Internet. Zed Books, Limited, 2019.
Znajdź pełny tekst źródłaGriffith, James. Great Firewall of China: How to Build and Control an Alternate Vision of the Internet. Zed Books, Limited, 2019.
Znajdź pełny tekst źródłaCzęści książek na temat "Great Firewall"
Clayton, Richard, Steven J. Murdoch i Robert N. M. Watson. "Ignoring the Great Firewall of China". W Privacy Enhancing Technologies, 20–35. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11957454_2.
Pełny tekst źródłaTaylor, Monique. "Building Digital Authoritarianism: From the Great Firewall to the New IP". W China’s Digital Authoritarianism, 1–24. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-11252-2_1.
Pełny tekst źródłaGaufman, Elizaveta. "Cybercrime and Punishment: Security, Information War, and the Future of Runet". W The Palgrave Handbook of Digital Russia Studies, 115–34. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42855-6_7.
Pełny tekst źródłaMao, Weizhun. "Tiny Netizens Mocking the Great Firewall: Discourse, Power, and the Politics of Representation in China, 2005 to 2010". W Social Inequality & the Politics of Representation: A Global Landscape, 275–97. 1 Oliver's Yard, 55 City Road London EC1Y 1SP: SAGE Publications, Inc, 2013. http://dx.doi.org/10.4135/9781071934227.n18.
Pełny tekst źródłaKeats, Jonathon. "Great Firewall". W Virtual Words. Oxford University Press, 2010. http://dx.doi.org/10.1093/oso/9780195398540.003.0018.
Pełny tekst źródła"17. The Great Firewall". W Words of Fire, 186–94. New York University Press, 2020. http://dx.doi.org/10.18574/nyu/9780814763919.003.0020.
Pełny tekst źródłaGainous, Jason, Rongbin Han, Andrew W. MacDonald i Kevin M. Wagner. "Jumping Over the Great Firewall". W Directed Digital Dissidence in Autocracies, 72–83. Oxford University PressNew York, 2023. http://dx.doi.org/10.1093/oso/9780197680384.003.0005.
Pełny tekst źródła"Jumping the wall". W The Great Firewall of China. Zed Books Ltd, 2019. http://dx.doi.org/10.5040/9781350225497.ch-009.
Pełny tekst źródła"Uyghurs online". W The Great Firewall of China. Zed Books Ltd, 2019. http://dx.doi.org/10.5040/9781350225497.ch-011.
Pełny tekst źródła"NoGuGe". W The Great Firewall of China. Zed Books Ltd, 2019. http://dx.doi.org/10.5040/9781350225497.ch-014.
Pełny tekst źródłaStreszczenia konferencji na temat "Great Firewall"
Pang, Sheng, Changjia Chen i Jinkang Jia. "Session Hijack in the Great Firewall of China". W 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC). IEEE, 2009. http://dx.doi.org/10.1109/nswctc.2009.277.
Pełny tekst źródłaEnsafi, Roya, David Fifield, Philipp Winter, Nick Feamster, Nicholas Weaver i Vern Paxson. "Examining How the Great Firewall Discovers Hidden Circumvention Servers". W IMC '15: Internet Measurement Conference. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2815675.2815690.
Pełny tekst źródłaComb, Matthew, i Paul A. Watters. "Peeking behind the great firewall: Privacy on Chinese file sharing networks". W 2016 14th Annual Conference on Privacy, Security and Trust (PST). IEEE, 2016. http://dx.doi.org/10.1109/pst.2016.7907024.
Pełny tekst źródłaWeinberg, Zachary, Diogo Barradas i Nicolas Christin. "Chinese Wall or Swiss Cheese? Keyword filtering in the Great Firewall of China". W WWW '21: The Web Conference 2021. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3442381.3450076.
Pełny tekst źródłaChandel, Sonali, Zang Jingji, Yu Yunnan, Sun Jingyao i Zhang Zhipeng. "The Golden Shield Project of China: A Decade Later—An in-Depth Study of the Great Firewall". W 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE, 2019. http://dx.doi.org/10.1109/cyberc.2019.00027.
Pełny tekst źródłaHillmer, Dirk. "VirTeam Tool". W ASME 1997 Design Engineering Technical Conferences. American Society of Mechanical Engineers, 1997. http://dx.doi.org/10.1115/detc97/cie-4298.
Pełny tekst źródłaRaporty organizacyjne na temat "Great Firewall"
Whiting, Michael D. The Great Firewall of China: A Critical Analysis. Fort Belvoir, VA: Defense Technical Information Center, czerwiec 2008. http://dx.doi.org/10.21236/ada488175.
Pełny tekst źródła