Book description
Cyberdefense has become, over the past five years, a major issue on the international scene. China, by the place it occupies, is the subject of attention: it is observed, criticized, and designated by many states as a major player in the global cyber-insecurity. The United States is building their cyberdefense strategy against what they call the "Chinese threat." It is therefore important to better understand today's challenges related to cyber dimension in regard of the rise of China.
Contributions from international researchers provide cross perspectives on China, its strategies and policies for cybersecurity and cyberdefense. These issues have now gained major strategic dimension:
Is Cyberspace changing the scene of international relations?
How China does apprehend cybersecurity and cyberdefense?
What are the issues, challenges?
What is the role of China in the global cyberspace?
Table of contents
- Cover
- Contents
- Title Page
- Copyright
- Author Biographies
- Introduction
- 1 China’s Internet Development and Cybersecurity – Policies and Practices
- 2 PLA Views on Informationized Warfare, Information Warfare and Information Operations
- 3 China’s Adaptive Internet Management Strategy after the Emergence of Social Networks
- 4 India’s Cybersecurity – The Landscape
- 5 China and Southeast Asia: Offline Information Penetration and Suspicions of Online Hacking – Strategic Implications from a Singaporean Perspective
- 6 Impact of Mongolia’s Choices in International Politics on Cybersecurity
- 7 China-Iran-Russia – A Cybercommunity of Information?
- 8 Discourse Regarding China: Cyberspace and Cybersecurity
- General Conclusion
- List of Authors
- Index
Product information
- Title: Chinese Cybersecurity and Cyberdefense
- Author(s):
- Release date: April 2015
- Publisher(s): Wiley-ISTE
- ISBN: 9781848216143
You might also like
book
Trade Secret Theft, Industrial Espionage, and the China Threat
This book provides an overview of economic espionage as practiced by a range of nations from …
book
Handbook on Securing Cyber-Physical Critical Infrastructure
The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on …
book
Enterprise Java™ Security: Building Secure J2EE™ Applications
provides application developers and programmers with the know-how they need to utilize the latest Java security …
book
Introduction to Transportation Security
Providing transportation managers with the knowledge, skills, and abilities to effectively manage the security of transportation …