United Kingdom
Select regional store:
21st Century Chinese Cyberwarfare

21st Century Chinese Cyberwarfare

Authors: Lieutenant Colonel Hagestad
Publishers: IT Governance Publishing
Format: Adobe eBook
ISBN13: 9781849283359
Pages: 349
Published: 15 Mar 2012
Availability: Always Available
Format: ePub
ISBN13: 9781849283663
Pages: 349
Published: 15 Mar 2012
Availability: Always Available
Format: Softcover
ISBN13: 9781849283342
Pages: 364
Published: 05 Mar 2012
Availability: In Stock
  • The first book to expose the extent of Chinese cyberwarfare, giving readers an understanding of how it might affect them or their organisation.
  • Covers the motivation of cyberwarfare, helping organisations to understand the nature of the threats they face.
  • Buy this book and learn the strategies used by China in the global cyberwar.

What format do I need?

Options:
Price: £49.95

Description

Understand China's cyberwarfare

21st Century Chinese Cyberwarfare presents the salient information regarding the use of cyberwarfare doctrine by the People's Republic of China to promote its own interests and enforce its will on other nations, and draws from a combination of business, cultural, historical and linguistic sources, as well as the author's personal experience, to attempt to explain China to the uninitiated. The author argues that the threat of Chinese cyberwarfare can no longer be ignored, that it is a clear and present danger to organisations of all shapes and sizes, and that it will be economically, societally and culturally damaging for the nations that are targeted.

Product overview

Those that will benefit from the book include: law enforcement agencies; international information security professionals; IT professionals; military professionals; government policy makers and corporate managers. In particular, the book discusses:

  • statistics of the Chinese cyber threat.
  • Chinese government cyber initiatives.
  • understanding the key motivators for government-sponsored cyberwarfare.
  • commercial enterprises as a cyber threat vector.
  • nationalistic threats of Chinese hackers.

Contents

1. The Chinese Cyberthreat

2. Evolution of Chinese Cyberwarfare

3. Chinese Unrestricted Warfare

4. Principles of Warfare – West versus East

5. Nature of Information Warfare

6. Chinese Cyberwarfare Doctrines

7. China's SIGINT Capabilities

8. Chinese IW Capabilities

9. The Chinese IW Organizational Structure

10. Chinese Commercial Enterprises

11. Commercial Objectives of Chinese Cyberattacks

12. Chinese Civilian Hackers

13. The Chinese Cyberthreat: Conclusions

Appendix A: China & the Internet – A history

Appendix B: Chinese Cyberactivism in the Spotlight

Appendix C: China's Informization Campaign

Appendix D: General Wang Pufeng's Challenge of Information Warfare

Appendix E: Chinese Hacker Website Resources

Appendix F: Huawei's Statement on Establishing a Global Cybersecurity Assurance System

About the author

Lieutenant Colonel William Hagestad is recognised internationally as an expert on the Chinese People's Liberation Army and government information warfare. He advises international intelligence organisations, military flag officers, and multi-national commercial enterprises on their internal IT security governance and external security policies. He currently speaks both domestically and internationally on the Chinese cyber threat.

Buy today, in any format. We’ll send you a download link right away, or dispatch today for swift delivery to your selected destination.

Customer Reviews

(1# of Ratings:)
10/12/2015
0 people found this comment helpful
0 did not
Was this comment helpful?
|
To me, the book is a cross between a military text book and an IT Security book. The military part of the book covers Chinese military doctrine for conducting cyber operations, placing the Chinese method of conducting a virtual offensive soundly on a theoretical basis. It suggests Chinese principles of war, but in the cyberwarfare areana. It supports analysis with a detailed breakdown of the Chinese organisation / structures for conducting cyber operations, showing how the People's Liberation army, is supported by State Owned Enterprises and state sponsored hackers. The book is well worth reading for those interested in IT Security set in its wider importance.
Showing comments 1-1 of 1
Loading...