Page de couverture de China and Cybersecurity

China and Cybersecurity

Espionage, Strategy, and Politics in the Digital Domain

Aperçu

30 jours d'essai gratuit à Audible Standard

Essayez l’abonnement standard gratuitement
Choisissez 1 livre audio par mois dans notre collection contenant plus de 900 000 titres.
Écoutez les livres audio que vous avez sélectionnés tant que vous êtes membre.
Profitez d’un accès illimité à des balados incontournables.
L'abonnement Standard se renouvelle automatiquement au tarif de 8,99 $/mois + taxes applicables après 30 jours. Annulation possible à tout moment.

China and Cybersecurity

Auteur(s): Jon R. Lindsay - editor, Tai Ming Cheung - editor, Derek S. Reveron - editor
Narrateur(s): Rebecca Lam
Essayez l’abonnement standard gratuitement

8,99 $/mois après 30 jours. Annulable en tout temps

Acheter pour 24,86 $

Acheter pour 24,86 $

À propos de cet audio

Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story. Chinese leaders are also concerned with cyber insecurity, and Chinese authors frequently note that China is also a victim of foreign cyber attacks—predominantly from the United States.

China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain is a comprehensive analysis of China's cyberspace threats and policies. The contributors—Chinese specialists in cyber dynamics, experts on China, and experts on the use of information technology between China and the West—address cyberspace threats and policies, emphasizing the vantage points of China and the US on cyber exploitation and the possibilities for more positive coordination with the West. The volume's multi-disciplinary, cross-cultural approach does not pretend to offer wholesale resolutions. Contributors take different stances on how problems may be analyzed and reduced. The compilation provides empirical and evaluative depth on the deepening dependence on shared global information infrastructure and the growing willingness to exploit it for political or economic gain.

©2015 Oxford University Press (P)2024 Ascent Audio
International Liberté et sécurité Politique Sécurité et chiffrement Chine Militaire Guerre cybernétique Cybersécurité Espionnage Piratage Technologie Sécurité informatique Russie
Pas encore de commentaire