21st Century Chinese Cyberwarfare

Author:   Bill Hagestad
Publisher:   IT Governance Publishing
ISBN:  

9781849283342


Pages:   328
Publication Date:   05 March 2012
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $200.61 Quantity:  
Add to Cart

Share |

21st Century Chinese Cyberwarfare


Add your own review!

Overview

This book is the first to gather the salient information regarding the use of cyber warfare doctrine by the People’s Republic of China to promote its own hegemonistic, national self-interests and enforce its political, military and economic will on other nation states. The threat of Chinese Cyberwarfare can no longer be ignored. It is a clear and present danger to the experienced and innocent alike and will be economically, societally and culturally changing and damaging for the nations that are targeted.

Full Product Details

Author:   Bill Hagestad
Publisher:   IT Governance Publishing
Imprint:   IT Governance Publishing
Dimensions:   Width: 17.00cm , Height: 1.70cm , Length: 24.40cm
Weight:   0.526kg
ISBN:  

9781849283342


ISBN 10:   1849283346
Pages:   328
Publication Date:   05 March 2012
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

1. The Chinese Cyberthreat 2. Evolution of Chinese Cyberwarfare 3. Chinese Unrestricted Warfare 4. Principles of Warfare – West versus East 5. Nature of Information Warfare 6. Chinese Cyberwarfare Doctrines 7. China's SIGINT Capabilities 8. Chinese IW Capabilities 9. The Chinese IW Organizational Structure 10. Chinese Commercial Enterprises 11. Commercial Objectives of Chinese Cyberattacks 12. Chinese Civilian Hackers 13. The Chinese Cyberthreat: Conclusions Appendix A: China & the Internet – A history Appendix B: Chinese Cyberactivism in the Spotlight Appendix C: China's Informization Campaign Appendix D: General Wang Pufeng's Challenge of Information Warfare Appendix E: Chinese Hacker Website Resources Appendix F: Huawei's Statement on Establishing a Global Cybersecurity Assurance System

Reviews

To me, the book is a cross between a military text book and an IT Security book. The military part of the book covers Chinese military doctrine for conducting cyber operations, placing the Chinese method of conducting a virtual offensive soundly on a theoretical basis. It suggests Chinese principles of war, but in the cyberwarfare arena. It supports analysis with a detailed breakdown of the Chinese organisation/structures for conducting cyber operations, showing how the People's Liberation army, is supported by State Owned Enterprises and state sponsored hackers. The book is well worth reading for those interested in IT Security set in its wider importance. -- Mr J. Curry


Author Information

Lieutenant Colonel William Hagestad has a Masters of Science in Security Technologies from the College of Computer Engineering, University of Minnesota and a Bachelor of Arts in Mandarin Chinese. He also holds a second Masters of Science in the Management of Technology from the Carlson School of Management, University of Minnesota. His military experience spans more than 27 years. He enlisted in the United States Marine Corps in 1981 and served in numerous command posts before retirement. Lieutenant Colonel Hagestad is recognised internationally as an expert on the Chinese People's Liberation Army and Government Information Warfare. He advises international intelligence organisations, military flag officers, and multi-national commercial enterprises on their internal IT security governance and external security policies. He currently speaks both domestically and internationally on the Chinese cyber threat.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List