|
![]() |
|||
|
||||
OverviewThis book is the first to gather the salient information regarding the use of cyber warfare doctrine by the People’s Republic of China to promote its own hegemonistic, national self-interests and enforce its political, military and economic will on other nation states. The threat of Chinese Cyberwarfare can no longer be ignored. It is a clear and present danger to the experienced and innocent alike and will be economically, societally and culturally changing and damaging for the nations that are targeted. Full Product DetailsAuthor: Bill HagestadPublisher: IT Governance Publishing Imprint: IT Governance Publishing Dimensions: Width: 17.00cm , Height: 1.70cm , Length: 24.40cm Weight: 0.526kg ISBN: 9781849283342ISBN 10: 1849283346 Pages: 328 Publication Date: 05 March 2012 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of Contents1. The Chinese Cyberthreat 2. Evolution of Chinese Cyberwarfare 3. Chinese Unrestricted Warfare 4. Principles of Warfare – West versus East 5. Nature of Information Warfare 6. Chinese Cyberwarfare Doctrines 7. China's SIGINT Capabilities 8. Chinese IW Capabilities 9. The Chinese IW Organizational Structure 10. Chinese Commercial Enterprises 11. Commercial Objectives of Chinese Cyberattacks 12. Chinese Civilian Hackers 13. The Chinese Cyberthreat: Conclusions Appendix A: China & the Internet – A history Appendix B: Chinese Cyberactivism in the Spotlight Appendix C: China's Informization Campaign Appendix D: General Wang Pufeng's Challenge of Information Warfare Appendix E: Chinese Hacker Website Resources Appendix F: Huawei's Statement on Establishing a Global Cybersecurity Assurance SystemReviewsTo me, the book is a cross between a military text book and an IT Security book. The military part of the book covers Chinese military doctrine for conducting cyber operations, placing the Chinese method of conducting a virtual offensive soundly on a theoretical basis. It suggests Chinese principles of war, but in the cyberwarfare arena. It supports analysis with a detailed breakdown of the Chinese organisation/structures for conducting cyber operations, showing how the People's Liberation army, is supported by State Owned Enterprises and state sponsored hackers. The book is well worth reading for those interested in IT Security set in its wider importance. -- Mr J. Curry Author InformationLieutenant Colonel William Hagestad has a Masters of Science in Security Technologies from the College of Computer Engineering, University of Minnesota and a Bachelor of Arts in Mandarin Chinese. He also holds a second Masters of Science in the Management of Technology from the Carlson School of Management, University of Minnesota. His military experience spans more than 27 years. He enlisted in the United States Marine Corps in 1981 and served in numerous command posts before retirement. Lieutenant Colonel Hagestad is recognised internationally as an expert on the Chinese People's Liberation Army and Government Information Warfare. He advises international intelligence organisations, military flag officers, and multi-national commercial enterprises on their internal IT security governance and external security policies. He currently speaks both domestically and internationally on the Chinese cyber threat. Tab Content 6Author Website:Countries AvailableAll regions |