China and Cybersecurity: espionage, strategy, and politics in the digital domain
Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story. Chinese lea...
Gespeichert in:
Weitere beteiligte Personen: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
[Place of publication not identified]
Ascent Audio
2024
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781663734273/?ar |
Zusammenfassung: | Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story. Chinese leaders are also concerned with cyber insecurity, and Chinese authors frequently note that China is also a victim of foreign cyber attacks-predominantly from the United States. China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain is a comprehensive analysis of China's cyberspace threats and policies. The contributors-Chinese specialists in cyber dynamics, experts on China, and experts on the use of information technology between China and the West-address cyberspace threats and policies, emphasizing the vantage points of China and the US on cyber exploitation and the possibilities for more positive coordination with the West. The volume's multi-disciplinary, cross-cultural approach does not pretend to offer wholesale resolutions. Contributors take different stances on how problems may be analyzed and reduced. The compilation provides empirical and evaluative depth on the deepening dependence on shared global information infrastructure and the growing willingness to exploit it for political or economic gain. |
Beschreibung: | Online resource; title from title details screen (O'Reilly, viewed June 3, 2024) |
Umfang: | 1 Online-Ressource (1 audio file) |
ISBN: | 9781663734273 1663734275 |
Internformat
MARC
LEADER | 00000nam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-104370645 | ||
003 | DE-627-1 | ||
005 | 20240701091202.0 | ||
007 | cr uuu---uuuuu | ||
008 | 240701s2024 xx |||||o 00| ||eng c | ||
020 | |a 9781663734273 |9 978-1-6637-3427-3 | ||
020 | |a 1663734275 |9 1-6637-3427-5 | ||
035 | |a (DE-627-1)104370645 | ||
035 | |a (DE-599)KEP104370645 | ||
035 | |a (ORHE)9781663734273 | ||
035 | |a (DE-627-1)104370645 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8/0951 |2 23/eng/20240603 | |
245 | 1 | 0 | |a China and Cybersecurity |b espionage, strategy, and politics in the digital domain |c edited by Jon R. Lindsay, Tai Ming Cheung, Derek S. Reveron |
264 | 1 | |a [Place of publication not identified] |b Ascent Audio |c 2024 | |
300 | |a 1 Online-Ressource (1 audio file) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Online resource; title from title details screen (O'Reilly, viewed June 3, 2024) | ||
520 | |a Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story. Chinese leaders are also concerned with cyber insecurity, and Chinese authors frequently note that China is also a victim of foreign cyber attacks-predominantly from the United States. China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain is a comprehensive analysis of China's cyberspace threats and policies. The contributors-Chinese specialists in cyber dynamics, experts on China, and experts on the use of information technology between China and the West-address cyberspace threats and policies, emphasizing the vantage points of China and the US on cyber exploitation and the possibilities for more positive coordination with the West. The volume's multi-disciplinary, cross-cultural approach does not pretend to offer wholesale resolutions. Contributors take different stances on how problems may be analyzed and reduced. The compilation provides empirical and evaluative depth on the deepening dependence on shared global information infrastructure and the growing willingness to exploit it for political or economic gain. | ||
650 | 0 | |a Computer security |z China | |
650 | 4 | |a Sécurité informatique ; Chine | |
650 | 4 | |a Audiobooks | |
650 | 4 | |a Livres audio | |
700 | 1 | |a Lindsay, Jon R. |e HerausgeberIn |4 edt | |
700 | 1 | |a Cheung, Tai Ming |e HerausgeberIn |4 edt | |
700 | 1 | |a Reveron, Derek S. |e HerausgeberIn |4 edt | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781663734273/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-104370645 |
---|---|
_version_ | 1821494930580701184 |
adam_text | |
any_adam_object | |
author2 | Lindsay, Jon R. Cheung, Tai Ming Reveron, Derek S. |
author2_role | edt edt edt |
author2_variant | j r l jr jrl t m c tm tmc d s r ds dsr |
author_facet | Lindsay, Jon R. Cheung, Tai Ming Reveron, Derek S. |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)104370645 (DE-599)KEP104370645 (ORHE)9781663734273 |
dewey-full | 005.8/0951 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/0951 |
dewey-search | 005.8/0951 |
dewey-sort | 15.8 3951 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02860nam a22004092 4500</leader><controlfield tag="001">ZDB-30-ORH-104370645</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240701091202.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240701s2024 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781663734273</subfield><subfield code="9">978-1-6637-3427-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1663734275</subfield><subfield code="9">1-6637-3427-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)104370645</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP104370645</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781663734273</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)104370645</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/0951</subfield><subfield code="2">23/eng/20240603</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">China and Cybersecurity</subfield><subfield code="b">espionage, strategy, and politics in the digital domain</subfield><subfield code="c">edited by Jon R. Lindsay, Tai Ming Cheung, Derek S. Reveron</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">Ascent Audio</subfield><subfield code="c">2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 audio file)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from title details screen (O'Reilly, viewed June 3, 2024)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story. Chinese leaders are also concerned with cyber insecurity, and Chinese authors frequently note that China is also a victim of foreign cyber attacks-predominantly from the United States. China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain is a comprehensive analysis of China's cyberspace threats and policies. The contributors-Chinese specialists in cyber dynamics, experts on China, and experts on the use of information technology between China and the West-address cyberspace threats and policies, emphasizing the vantage points of China and the US on cyber exploitation and the possibilities for more positive coordination with the West. The volume's multi-disciplinary, cross-cultural approach does not pretend to offer wholesale resolutions. Contributors take different stances on how problems may be analyzed and reduced. The compilation provides empirical and evaluative depth on the deepening dependence on shared global information infrastructure and the growing willingness to exploit it for political or economic gain.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="z">China</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique ; Chine</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Audiobooks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Livres audio</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lindsay, Jon R.</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cheung, Tai Ming</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Reveron, Derek S.</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781663734273/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-104370645 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:22:12Z |
institution | BVB |
isbn | 9781663734273 1663734275 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 audio file) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | Ascent Audio |
record_format | marc |
spelling | China and Cybersecurity espionage, strategy, and politics in the digital domain edited by Jon R. Lindsay, Tai Ming Cheung, Derek S. Reveron [Place of publication not identified] Ascent Audio 2024 1 Online-Ressource (1 audio file) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Online resource; title from title details screen (O'Reilly, viewed June 3, 2024) Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story. Chinese leaders are also concerned with cyber insecurity, and Chinese authors frequently note that China is also a victim of foreign cyber attacks-predominantly from the United States. China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain is a comprehensive analysis of China's cyberspace threats and policies. The contributors-Chinese specialists in cyber dynamics, experts on China, and experts on the use of information technology between China and the West-address cyberspace threats and policies, emphasizing the vantage points of China and the US on cyber exploitation and the possibilities for more positive coordination with the West. The volume's multi-disciplinary, cross-cultural approach does not pretend to offer wholesale resolutions. Contributors take different stances on how problems may be analyzed and reduced. The compilation provides empirical and evaluative depth on the deepening dependence on shared global information infrastructure and the growing willingness to exploit it for political or economic gain. Computer security China Sécurité informatique ; Chine Audiobooks Livres audio Lindsay, Jon R. HerausgeberIn edt Cheung, Tai Ming HerausgeberIn edt Reveron, Derek S. HerausgeberIn edt |
spellingShingle | China and Cybersecurity espionage, strategy, and politics in the digital domain Computer security China Sécurité informatique ; Chine Audiobooks Livres audio |
title | China and Cybersecurity espionage, strategy, and politics in the digital domain |
title_auth | China and Cybersecurity espionage, strategy, and politics in the digital domain |
title_exact_search | China and Cybersecurity espionage, strategy, and politics in the digital domain |
title_full | China and Cybersecurity espionage, strategy, and politics in the digital domain edited by Jon R. Lindsay, Tai Ming Cheung, Derek S. Reveron |
title_fullStr | China and Cybersecurity espionage, strategy, and politics in the digital domain edited by Jon R. Lindsay, Tai Ming Cheung, Derek S. Reveron |
title_full_unstemmed | China and Cybersecurity espionage, strategy, and politics in the digital domain edited by Jon R. Lindsay, Tai Ming Cheung, Derek S. Reveron |
title_short | China and Cybersecurity |
title_sort | china and cybersecurity espionage strategy and politics in the digital domain |
title_sub | espionage, strategy, and politics in the digital domain |
topic | Computer security China Sécurité informatique ; Chine Audiobooks Livres audio |
topic_facet | Computer security China Sécurité informatique ; Chine Audiobooks Livres audio |
work_keys_str_mv | AT lindsayjonr chinaandcybersecurityespionagestrategyandpoliticsinthedigitaldomain AT cheungtaiming chinaandcybersecurityespionagestrategyandpoliticsinthedigitaldomain AT reverondereks chinaandcybersecurityespionagestrategyandpoliticsinthedigitaldomain |