China's emergence as a great power in the twenty-first century is strongly enabled by cyberspace. Leveraged information technology integrates Chinese firms into the global economy, modernizes infrastructure, and increases internet penetration which helps boost export-led growth. China's pursuit of "informatization " reconstructs industrial sectors and solidifies the transformation of the Chinese People's Liberation Army into a formidable regional power. Even as the government censors content online, China has one of the fastest growing internet populations and most of the technology is created and used by civilians.
Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story. Chinese leaders are also concerned with cyber insecurity, and Chinese authors frequently note that China is also a victim of foreign cyber---attacks---predominantly from the United States.
China and Cybersecurity: Political, Economic, and Strategic Dimensions is a comprehensive analysis of China's cyberspace threats and policies. The contributors---Chinese specialists in cyber dynamics, experts on China, and experts on the use of information technology between China and the West---address cyberspace threats and policies, emphasizing the vantage points of China and the U.S. on cyber exploitation and the possibilities for more positive coordination with the West. The volume's multi-disciplinary, cross-cultural approach does not pretend to offer wholesale resolutions. Contributors take different stances on how problems may be analyzed and reduced, and aim to inform the international audience of how China's political, economic, and security systems shape cyber activities. The compilation provides empirical and evaluative depth on the deepening dependence on shared global information infrastructure and the growing willingness to exploit it for political or economic gain.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
Jon R. Lindsay's research examines the impact of technology on international security and strategy and has been published in leading academic journals such as International Security, Security Studies, Journal of Strategic Studies, and Technology and Culture. He holds a PhD in political science from the Massachusetts Institute of Technology and an MS in computer science and BS in symbolic systems from Stanford University. He is an officer in the U.S. naval reserve with seventeen years of experience including assignments in Asia, Europe, Latin America, and the Middle East.
Tai Ming Cheung, director of the University of California Institute on Global Conflict and Cooperation, is a long-time analyst of Chinese and East Asian defense and national security affairs with particular expertise on the political economy of science, technology, and innovation and their impact on national security matters. Dr. Cheung was based in Asia from the mid-1980s to 2002 covering political, economic and strategic developments in greater China. He was also a journalist and political and business risk consultant in northeast Asia. Dr. Cheung received his PhD from the War Studies Department at King's College, London University.
Derek S. Reveron is a professor of national security affairs and the EMC Informationist Chair at the U.S. Naval War College. He specializes in strategy development, non-state security challenges, and U.S. defense policy. He has published nine books including U.S. Foreign Policy and Defense Strategy: The Evolution of an Incidental Superpower (2015), Cyberspace and National Security: Threats, Opportunities, and Power in a Virtual World (2012) and Human Security in a Borderless World (2011). He received a a PhD in public policy analysis from the University of Illinois at Chicago.
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
Da: Textbooks_Source, Columbia, MO, U.S.A.
paperback. Condizione: Good. 1st Edition. Ships in a BOX from Central Missouri! May not include working access code. Will not include dust jacket. Has used sticker(s) and some writing or highlighting. UPS shipping for most packages, (Priority Mail for AK/HI/APO/PO Boxes). Codice articolo 001905189U
Quantità: 1 disponibili
Da: Moe's Books, Berkeley, CA, U.S.A.
Soft cover. Condizione: Good. No jacket. Cover is worn. Back upper corner has been folded. Upper corners of pages 305-375 have been slightly folded as well. Inside is clean and unmarked. Codice articolo 1139412
Quantità: 1 disponibili
Da: Better World Books, Mishawaka, IN, U.S.A.
Condizione: Very Good. 1st Edition. Former library copy. Pages intact with possible writing/highlighting. Binding strong with minor wear. Dust jackets/supplements may not be included. Includes library markings. Stock photo provided. Product includes identifying sticker. Better World Books: Buy Books. Do Good. Codice articolo 39879594-6
Quantità: 1 disponibili
Da: 3rd St. Books, Lees Summit, MO, U.S.A.
Soft cover. Condizione: Good. 1st Edition. Good, clean, tight condition. Text has few marks and underlining, and previous owner's notes on front page. Professional book dealer since 1999. All orders are processed promptly and carefully packaged with tracking. Codice articolo 064095
Quantità: 1 disponibili
Da: Textbooks_Source, Columbia, MO, U.S.A.
paperback. Condizione: New. 1st Edition. Ships in a BOX from Central Missouri! UPS shipping for most packages, (Priority Mail for AK/HI/APO/PO Boxes). Codice articolo 001905189N
Quantità: 9 disponibili
Da: GreatBookPrices, Columbia, MD, U.S.A.
Condizione: New. Codice articolo 22078729-n
Quantità: Più di 20 disponibili
Da: INDOO, Avenel, NJ, U.S.A.
Condizione: New. Brand New. Codice articolo 9780190201272
Quantità: 14 disponibili
Da: GreatBookPrices, Columbia, MD, U.S.A.
Condizione: As New. Unread book in perfect condition. Codice articolo 22078729
Quantità: Più di 20 disponibili
Da: Paul Hanson T/A Brecon Books, Brecon, POWYS, Regno Unito
Soft cover. Condizione: Very Good. No Jacket. 1st Edition. Fine clean and bright,large format softcover.May require additional overseas shipping charges. Codice articolo 22938
Quantità: 1 disponibili
Da: Rarewaves.com USA, London, LONDO, Regno Unito
Paperback. Condizione: New. China's emergence as a great power in the twenty-first century is strongly enabled by cyberspace. Leveraged information technology integrates Chinese firms into the global economy, modernizes infrastructure, and increases internet penetration which helps boost export-led growth. China's pursuit of "informatization " reconstructs industrial sectors and solidifies the transformation of the Chinese People's Liberation Army into a formidable regional power. Even as the government censors content online, China has one of the fastest growing internet populations and most of the technology is created and used by civilians. Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story. Chinese leaders are also concerned with cyber insecurity, and Chinese authors frequently note that China is also a victim of foreign cyber---attacks---predominantly from the United States.China and Cybersecurity: Political, Economic, and Strategic Dimensions is a comprehensive analysis of China's cyberspace threats and policies. The contributors---Chinese specialists in cyber dynamics, experts on China, and experts on the use of information technology between China and the West---address cyberspace threats and policies, emphasizing the vantage points of China and the U.S. on cyber exploitation and the possibilities for more positive coordination with the West. The volume's multi-disciplinary, cross-cultural approach does not pretend to offer wholesale resolutions. Contributors take different stances on how problems may be analyzed and reduced, and aim to inform the international audience of how China's political, economic, and security systems shape cyber activities. The compilation provides empirical and evaluative depth on the deepening dependence on shared global information infrastructure and the growing willingness to exploit it for political or economic gain. Codice articolo LU-9780190201272
Quantità: Più di 20 disponibili