소장자료
LDR | 04980cam a2200385 a 4500 | ||
001 | 0093134959▲ | ||
003 | DLC▲ | ||
005 | 20180520071902▲ | ||
008 | 150105s2015 nyu b 001 0 eng c▲ | ||
010 | ▼a2014046287▲ | ||
020 | ▼a9780190201265 (hardback)▲ | ||
020 | ▼a9780190201272 (paperback)▲ | ||
040 | ▼aDLC▼beng▼cDLC▼dDLC▲ | ||
042 | ▼apcc▲ | ||
043 | ▼aa-cc---▼an-us---▲ | ||
050 | 0 | 0 | ▼aHV6773.15.C97▼bC45 2015▲ |
082 | 0 | 0 | ▼a355.3/43202854678▼223▲ |
084 | ▼aCOM060040▼aPOL012000▼aBUS069020▼2bisacsh▲ | ||
090 | ▼a355.34320285▼bC539l▲ | ||
245 | 0 | 0 | ▼aChina and cybersecurity :▼bespionage, strategy, and politics in the digital domain /▼cedited by Jon R. Lindsay, Tai Ming Cheung, and Derek S. Reveron.▲ |
260 | ▼aNew York :▼bOxford University Press,▼c[2015]▲ | ||
300 | ▼axvii, 375 p. ;▼c25 cm.▲ | ||
504 | ▼aIncludes bibliographical references and index.▲ | ||
505 | 8 | ▼aMachine generated contents note: -- Introduction -- China and Cybersecurity: Controversy and Context -- Jon R. Lindsay -- I. ESPIONAGE AND CYBERCRIME -- 1. The Chinese Intelligence Services: Evolution and Empowerment in Cyberspace -- Nigel Inkster -- 2. From Exploitation to Innovation: Acquisition, Absorption, and Application -- Jon R. Lindsay and Tai Ming Cheung -- 3. Investigating the Chinese Online Underground Economy -- Zhuge Jianwei, Gu Lion, Duan Haixin, and Taylor Roberts -- II. MILITARY STRATEGY AND INSTITUTIONS -- 4. From Cyberwarfare to Cybersecurity in the Asia-Pacific and Beyond -- Ye Zheng -- 5. Chinese Writings on Cyber Warfare and Coercion -- Kevin Pollpeter -- 6. The Chinese People's Liberation Army Computer Network Operations Infrastructure -- Mark A. Stokes -- 7. Civil-Military Integration in Cybersecurity: A Study of Chinese Information Warfare Militias -- Robert Sheldon and Joe McReynolds -- III. NATIONAL CYBERSECURITY POLICY -- 8. China's Cybersecurity Situation and the Potential for International Cooperation -- Li Yuxiao and Xu Lu -- 9. Evolving Legal Frameworks for Protecting Internet Privacy in China -- Xu Jinghong -- 10. "Foreign Hostile Forces": The Human Rights Dimension of China's Cyber Campaigns -- Sarah McKune -- IV. PRACTICAL AND THEORETICAL IMPLICATIONS -- 11. China and Information Security Threats: Policy Responses in the United States -- Fred H. Cate -- Conclusion -- The Rise of China and the Future of Cybersecurity -- Jon R. Lindsay and Derek S. Reveron -- Index.▲ | |
520 | ▼a"China's emergence as a great power in the twenty-first century is strongly enabled by cyberspace. Leveraged information technology integrates Chinese firms into the global economy, modernizes infrastructure, and increases internet penetration which helps boost export-led growth. China's pursuit of "informatization" reconstructs industrial sectors and solidifies the transformation of the Chinese People's Liberation Army into a formidable regional power. Even as the government censors content online, China has one of the fastest growing internet populations and most of the technology is created and used by civilians. Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story. Chinese leaders are also concerned with cyber insecurity, and Chinese authors frequently note that China is also a victim of foreign cyber -- attacks -- predominantly from the United States. China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain is a comprehensive analysis of China's cyberspace threats and policies. The contributors -- Chinese specialists in cyber dynamics, experts on China, and experts on the use of information technology between China and the West -- address cyberspace threats and policies, emphasizing the vantage points of China and the U.S. on cyber exploitation and the possibilities for more positive coordination with the West. The volume's multi-disciplinary, cross-cultural approach does not pretend to offer wholesale resolutions. Contributors take different stances on how problems may be analyzed and reduced, and aim to inform the international audience of how China's political, economic, and security systems shape cyber activities. The compilation provides empirical and evaluative depth on the deepening▲ | ||
520 | ▼a"Examines cyberspace threats and policies from the vantage points of China and the U.S"--▼cProvided by publisher.▲ | ||
520 | ▼adependence on shared global information infrastructure and the growing willingness to exploit it for political or economic gain"--▼cProvided by publisher.▲ | ||
650 | 0 | ▼aCyberterrorism▼zChina.▲ | |
650 | 0 | ▼aNational security▼zUnited States.▲ | |
650 | 0 | ▼aSecurity, International.▲ | |
650 | 0 | ▼aInternational cooperation.▲ | |
700 | 1 | ▼aLindsay, Jon R.▲ | |
700 | 1 | ▼aCheung, Tai Ming.▲ | |
700 | 1 | ▼aReveron, Derek S.▲ | |
999 | ▼c김정이▲ |
China and cybersecurity :espionage, strategy, and politics in the digital domain
자료유형
국외단행본
서명/책임사항
China and cybersecurity : espionage, strategy, and politics in the digital domain / edited by Jon R. Lindsay, Tai Ming Cheung, and Derek S. Reveron.
발행사항
New York : Oxford University Press , [2015]
형태사항
xvii, 375 p. ; 25 cm.
서지주기
Includes bibliographical references and index.
내용주기
Machine generated contents note: -- Introduction -- China and Cybersecurity: Controversy and Context -- Jon R. Lindsay -- I. ESPIONAGE AND CYBERCRIME -- 1. The Chinese Intelligence Services: Evolution and Empowerment in Cyberspace -- Nigel Inkster -- 2. From Exploitation to Innovation: Acquisition, Absorption, and Application -- Jon R. Lindsay and Tai Ming Cheung -- 3. Investigating the Chinese Online Underground Economy -- Zhuge Jianwei, Gu Lion, Duan Haixin, and Taylor Roberts -- II. MILITARY STRATEGY AND INSTITUTIONS -- 4. From Cyberwarfare to Cybersecurity in the Asia-Pacific and Beyond -- Ye Zheng -- 5. Chinese Writings on Cyber Warfare and Coercion -- Kevin Pollpeter -- 6. The Chinese People's Liberation Army Computer Network Operations Infrastructure -- Mark A. Stokes -- 7. Civil-Military Integration in Cybersecurity: A Study of Chinese Information Warfare Militias -- Robert Sheldon and Joe McReynolds -- III. NATIONAL CYBERSECURITY POLICY -- 8. China's Cybersecurity Situation and the Potential for International Cooperation -- Li Yuxiao and Xu Lu -- 9. Evolving Legal Frameworks for Protecting Internet Privacy in China -- Xu Jinghong -- 10. "Foreign Hostile Forces": The Human Rights Dimension of China's Cyber Campaigns -- Sarah McKune -- IV. PRACTICAL AND THEORETICAL IMPLICATIONS -- 11. China and Information Security Threats: Policy Responses in the United States -- Fred H. Cate -- Conclusion -- The Rise of China and the Future of Cybersecurity -- Jon R. Lindsay and Derek S. Reveron -- Index.
요약주기
"China's emergence as a great power in the twenty-first century is strongly enabled by cyberspace. Leveraged information technology integrates Chinese firms into the global economy, modernizes infrastructure, and increases internet penetration which helps boost export-led growth. China's pursuit of "informatization" reconstructs industrial sectors and solidifies the transformation of the Chinese People's Liberation Army into a formidable regional power. Even as the government censors content online, China has one of the fastest growing internet populations and most of the technology is created and used by civilians. Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story. Chinese leaders are also concerned with cyber insecurity, and Chinese authors frequently note that China is also a victim of foreign cyber -- attacks -- predominantly from the United States. China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain is a comprehensive analysis of China's cyberspace threats and policies. The contributors -- Chinese specialists in cyber dynamics, experts on China, and experts on the use of information technology between China and the West -- address cyberspace threats and policies, emphasizing the vantage points of China and the U.S. on cyber exploitation and the possibilities for more positive coordination with the West. The volume's multi-disciplinary, cross-cultural approach does not pretend to offer wholesale resolutions. Contributors take different stances on how problems may be analyzed and reduced, and aim to inform the international audience of how China's political, economic, and security systems shape cyber activities. The compilation provides empirical and evaluative depth on the deepening/"Examines cyberspace threats and policies from the vantage points of China and the U.S"-- Provided by publisher./dependence on shared global information infrastructure and the growing willingness to exploit it for political or economic gain"-- Provided by publisher./
주제
ISBN
9780190201265 (hardback) 9780190201272 (paperback)
청구기호
355.34320285 C539l
소장정보
예도서예약
서서가에없는책 신고
보보존서고신청
캠캠퍼스대출
우우선정리신청
배자료배달신청
문문자발송
출청구기호출력
학소장학술지 원문서비스
등록번호 | 청구기호 | 소장처 | 도서상태 | 반납예정일 | 서비스 |
---|
북토크
자유롭게 책을 읽고
느낀점을 적어주세요
글쓰기
느낀점을 적어주세요
청구기호 브라우징
관련 인기대출 도서