China and Cybersecurity
Espionage, Strategy, and Politics in the Digital Domain
Herausgeber: Lindsay, Jon R; Reveron, Derek S; Cheung, Tai Ming
China and Cybersecurity
Espionage, Strategy, and Politics in the Digital Domain
Herausgeber: Lindsay, Jon R; Reveron, Derek S; Cheung, Tai Ming
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
A comprehensive analysis of China's cyberspace threats and policies, emphasizing the vantage points of China and U.S. on cyber exploitation and the possibilities for more positive coordination.
Andere Kunden interessierten sich auch für
- Raphael Cohen-AlmagorConfronting the Internet's Dark Side47,99 €
- David G PostIn Search of Jefferson's Moose42,99 €
- Vernon Valentine PalmerPure Economic Loss65,99 €
- Roberta GrecoThe Human Right to Water and International Economic Law58,99 €
- Consolidated List of Products Whose Consumption And/Or Sale Have Been Banned, Withdrawn, Severely Restricted or Not Approved by Governments, Fifteenth Issue (New Data Only, June 2007-June 2009)41,99 €
- Ioannis GlinavosRedefining the Market-State Relationship65,99 €
- Anna S VlasovaDoing Corporate Business in Russia65,99 €
-
-
-
A comprehensive analysis of China's cyberspace threats and policies, emphasizing the vantage points of China and U.S. on cyber exploitation and the possibilities for more positive coordination.
Produktdetails
- Produktdetails
- Verlag: Liverpool University Press
- Seitenzahl: 400
- Erscheinungstermin: 7. April 2015
- Englisch
- Abmessung: 233mm x 154mm x 27mm
- Gewicht: 557g
- ISBN-13: 9780190201272
- ISBN-10: 0190201274
- Artikelnr.: 47863613
- Verlag: Liverpool University Press
- Seitenzahl: 400
- Erscheinungstermin: 7. April 2015
- Englisch
- Abmessung: 233mm x 154mm x 27mm
- Gewicht: 557g
- ISBN-13: 9780190201272
- ISBN-10: 0190201274
- Artikelnr.: 47863613
Jon R. Lindsay's research examines the impact of technology on international security and strategy and has been published in leading academic journals such as International Security, Security Studies, Journal of Strategic Studies, and Technology and Culture. He holds a PhD in political science from the Massachusetts Institute of Technology and an MS in computer science and BS in symbolic systems from Stanford University. He is an officer in the U.S. naval reserve with seventeen years of experience including assignments in Asia, Europe, Latin America, and the Middle East. Tai Ming Cheung, director of the University of California Institute on Global Conflict and Cooperation, is a long-time analyst of Chinese and East Asian defense and national security affairs with particular expertise on the political economy of science, technology, and innovation and their impact on national security matters. Dr. Cheung was based in Asia from the mid-1980s to 2002 covering political, economic and strategic developments in greater China. He was also a journalist and political and business risk consultant in northeast Asia. Dr. Cheung received his PhD from the War Studies Department at King's College, London University. Derek S. Reveron is a professor of national security affairs and the EMC Informationist Chair at the U.S. Naval War College. He specializes in strategy development, non-state security challenges, and U.S. defense policy. He has published nine books including U.S. Foreign Policy and Defense Strategy: The Evolution of an Incidental Superpower (2015), Cyberspace and National Security: Threats, Opportunities, and Power in a Virtual World (2012) and Human Security in a Borderless World (2011). He received a a PhD in public policy analysis from the University of Illinois at Chicago.
* Introduction
* China and Cybersecurity: Controversy and Context
* Jon R. Lindsay
* I. ESPIONAGE AND CYBERCRIME
* 1. The Chinese Intelligence Services: Evolution and Empowerment in
Cyberspace
* Nigel Inkster
* 2. From Exploitation to Innovation: Acquisition, Absorption, and
Application
* Jon R. Lindsay and Tai Ming Cheung
* 3. Investigating the Chinese Online Underground Economy
* Zhuge Jianwei, Gu Lion, Duan Haixin, and Taylor Roberts
* II. MILITARY STRATEGY AND INSTITUTIONS
* 4. From Cyberwarfare to Cybersecurity in the Asia-Pacific and Beyond
* Ye Zheng
* 5. Chinese Writings on Cyber Warfare and Coercion
* Kevin Pollpeter
* 6. The Chinese People's Liberation Army Computer Network Operations
Infrastructure
* Mark A. Stokes
* 7. Civil-Military Integration in Cybersecurity: A Study of Chinese
Information Warfare Militias
* Robert Sheldon and Joe McReynolds
* III. NATIONAL CYBERSECURITY POLICY
* 8. China's Cybersecurity Situation and the Potential for
International Cooperation
* Li Yuxiao and Xu Lu
* 9. Evolving Legal Frameworks for Protecting Internet Privacy in China
* Xu Jinghong
* 10. "Foreign Hostile Forces ": The Human Rights Dimension of China's
Cyber Campaigns
* Sarah McKune
* IV. PRACTICAL AND THEORETICAL IMPLICATIONS
* 11. China and Information Security Threats: Policy Responses in the
United States
* Fred H. Cate
* Conclusion
* The Rise of China and the Future of Cybersecurity
* Jon R. Lindsay and Derek S. Reveron
* Index
* China and Cybersecurity: Controversy and Context
* Jon R. Lindsay
* I. ESPIONAGE AND CYBERCRIME
* 1. The Chinese Intelligence Services: Evolution and Empowerment in
Cyberspace
* Nigel Inkster
* 2. From Exploitation to Innovation: Acquisition, Absorption, and
Application
* Jon R. Lindsay and Tai Ming Cheung
* 3. Investigating the Chinese Online Underground Economy
* Zhuge Jianwei, Gu Lion, Duan Haixin, and Taylor Roberts
* II. MILITARY STRATEGY AND INSTITUTIONS
* 4. From Cyberwarfare to Cybersecurity in the Asia-Pacific and Beyond
* Ye Zheng
* 5. Chinese Writings on Cyber Warfare and Coercion
* Kevin Pollpeter
* 6. The Chinese People's Liberation Army Computer Network Operations
Infrastructure
* Mark A. Stokes
* 7. Civil-Military Integration in Cybersecurity: A Study of Chinese
Information Warfare Militias
* Robert Sheldon and Joe McReynolds
* III. NATIONAL CYBERSECURITY POLICY
* 8. China's Cybersecurity Situation and the Potential for
International Cooperation
* Li Yuxiao and Xu Lu
* 9. Evolving Legal Frameworks for Protecting Internet Privacy in China
* Xu Jinghong
* 10. "Foreign Hostile Forces ": The Human Rights Dimension of China's
Cyber Campaigns
* Sarah McKune
* IV. PRACTICAL AND THEORETICAL IMPLICATIONS
* 11. China and Information Security Threats: Policy Responses in the
United States
* Fred H. Cate
* Conclusion
* The Rise of China and the Future of Cybersecurity
* Jon R. Lindsay and Derek S. Reveron
* Index
* Introduction
* China and Cybersecurity: Controversy and Context
* Jon R. Lindsay
* I. ESPIONAGE AND CYBERCRIME
* 1. The Chinese Intelligence Services: Evolution and Empowerment in
Cyberspace
* Nigel Inkster
* 2. From Exploitation to Innovation: Acquisition, Absorption, and
Application
* Jon R. Lindsay and Tai Ming Cheung
* 3. Investigating the Chinese Online Underground Economy
* Zhuge Jianwei, Gu Lion, Duan Haixin, and Taylor Roberts
* II. MILITARY STRATEGY AND INSTITUTIONS
* 4. From Cyberwarfare to Cybersecurity in the Asia-Pacific and Beyond
* Ye Zheng
* 5. Chinese Writings on Cyber Warfare and Coercion
* Kevin Pollpeter
* 6. The Chinese People's Liberation Army Computer Network Operations
Infrastructure
* Mark A. Stokes
* 7. Civil-Military Integration in Cybersecurity: A Study of Chinese
Information Warfare Militias
* Robert Sheldon and Joe McReynolds
* III. NATIONAL CYBERSECURITY POLICY
* 8. China's Cybersecurity Situation and the Potential for
International Cooperation
* Li Yuxiao and Xu Lu
* 9. Evolving Legal Frameworks for Protecting Internet Privacy in China
* Xu Jinghong
* 10. "Foreign Hostile Forces ": The Human Rights Dimension of China's
Cyber Campaigns
* Sarah McKune
* IV. PRACTICAL AND THEORETICAL IMPLICATIONS
* 11. China and Information Security Threats: Policy Responses in the
United States
* Fred H. Cate
* Conclusion
* The Rise of China and the Future of Cybersecurity
* Jon R. Lindsay and Derek S. Reveron
* Index
* China and Cybersecurity: Controversy and Context
* Jon R. Lindsay
* I. ESPIONAGE AND CYBERCRIME
* 1. The Chinese Intelligence Services: Evolution and Empowerment in
Cyberspace
* Nigel Inkster
* 2. From Exploitation to Innovation: Acquisition, Absorption, and
Application
* Jon R. Lindsay and Tai Ming Cheung
* 3. Investigating the Chinese Online Underground Economy
* Zhuge Jianwei, Gu Lion, Duan Haixin, and Taylor Roberts
* II. MILITARY STRATEGY AND INSTITUTIONS
* 4. From Cyberwarfare to Cybersecurity in the Asia-Pacific and Beyond
* Ye Zheng
* 5. Chinese Writings on Cyber Warfare and Coercion
* Kevin Pollpeter
* 6. The Chinese People's Liberation Army Computer Network Operations
Infrastructure
* Mark A. Stokes
* 7. Civil-Military Integration in Cybersecurity: A Study of Chinese
Information Warfare Militias
* Robert Sheldon and Joe McReynolds
* III. NATIONAL CYBERSECURITY POLICY
* 8. China's Cybersecurity Situation and the Potential for
International Cooperation
* Li Yuxiao and Xu Lu
* 9. Evolving Legal Frameworks for Protecting Internet Privacy in China
* Xu Jinghong
* 10. "Foreign Hostile Forces ": The Human Rights Dimension of China's
Cyber Campaigns
* Sarah McKune
* IV. PRACTICAL AND THEORETICAL IMPLICATIONS
* 11. China and Information Security Threats: Policy Responses in the
United States
* Fred H. Cate
* Conclusion
* The Rise of China and the Future of Cybersecurity
* Jon R. Lindsay and Derek S. Reveron
* Index