Haku
Kirjaudu sisään
  • Kotisivu

  • Kategoriat

  • Äänikirjat

  • E-kirjat

  • Lapsille

  • Top listat

  • Ohje

  • Lataa sovellus

  • Käytä kampanjakoodia

  • Lunasta lahjakortti

  • Kokeile nyt ilmaiseksi
  • Kirjaudu sisään
  • Kieli

    🇫🇮 Suomi

    • FI
    • EN

    🇧🇪 Belgique

    • FR
    • EN

    🇩🇰 Danmark

    • DK
    • EN

    🇩🇪 Deutschland

    • DE
    • EN

    🇪🇸 España

    • ES
    • EN

    🇫🇷 France

    • FR
    • EN

    🇳🇱 Nederland

    • NL
    • EN

    🇳🇴 Norge

    • NO
    • EN

    🇦🇹 Österreich

    • AT
    • EN

    🇨🇭 Schweiz

    • DE
    • EN

    🇸🇪 Sverige

    • SE
    • EN
  1. Kirjat
  2. Tieto
  3. Tietokoneet ja IT

Lue ja kuuntele ilmaiseksi 14 päivää!

Peruuta milloin vain

Kokeile nyt ilmaiseksi
0.0(0)

China and Cybersecurity : Espionage, Strategy, and Politics in the Digital Domain

Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story. Chinese leaders are also concerned with cyber insecurity, and Chinese authors frequently note that China is also a victim of foreign cyber attacks—predominantly from the United States.

China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain is a comprehensive analysis of China's cyberspace threats and policies. The contributors—Chinese specialists in cyber dynamics, experts on China, and experts on the use of information technology between China and the West—address cyberspace threats and policies, emphasizing the vantage points of China and the US on cyber exploitation and the possibilities for more positive coordination with the West. The volume's multi-disciplinary, cross-cultural approach does not pretend to offer wholesale resolutions. Contributors take different stances on how problems may be analyzed and reduced. The compilation provides empirical and evaluative depth on the deepening dependence on shared global information infrastructure and the growing willingness to exploit it for political or economic gain.


Lukija:

  • Rebecca Lam

Muoto:

  • Äänikirja

Kesto:

  • 13 h 16 min

Kieli:

englanti

Kategoriat:

  • Tieto
  • Tietokoneet ja IT

Muut ovat myös lukeneet

Ohita lista
  1. The Art Of Conjuring Alternate Realities : How Information Warfare Shapes Your World

    Shivam Shivam Shankar Singh, Anand Anand Venkatanarayanan

    audiobook
  2. Ransomware Protection Playbook

    Roger A. Grimes

    audiobook
  3. Hack to the Future : How World Governments Relentlessly Pursue and Domesticate Hackers

    Emily Crose

    audiobook
  4. The Beat Generation

    Jamie Russell

    book
  5. Recessional : The Death of Free Speech and the Cost of a Free Lunch

    David Mamet

    audiobook
  6. Target Tehran : How Israel Is Using Sabotage, Cyberwarfare, Assassination – and Secret Diplomacy – to Stop a Nuclear Iran and Create a New Middle East

    Yonah Jeremy Bob, Ilan Evyatar

    audiobookbook
  7. Spies, Saboteurs and Secret Missions of World War II

    Tony Matthews

    audiobook
  8. Get Your Hero Up A Tree : How to Write a Movie (That Doesn't Stink)

    Mark Achtenberg

    audiobook
  9. Space Force!

    Taylor Dinerman

    audiobook
  10. Aerial Warfare

    Frank Ledwidge

    audiobook
  11. Mastering Information Security Compliance Management

    Adarsh Nair, Greeshma M. R.

    book
  12. The Program : Lessons From Elite Military Units for Creating and Sustaining High Performance Leaders and Teams

    Eric Kapitulik, Jake MacDonald

    audiobook

Ohjeet ja yhteystiedot


Tietoa meistä

  • Tarinamme
  • Ura
  • Media
  • Saavutettavuus
  • Ryhdy kumppaniksemme
  • Sijoittajasuhteet
  • Instagram
  • Facebook

Tutki

  • Kategoriat
  • Äänikirjat
  • E-kirjat
  • Aikakauslehdet
  • Lapsille
  • Top listat

Suositut kategoriat

  • Dekkarit
  • Elämäkerrat ja reportaasit
  • Romaanit
  • Rakkaus ja feelgood
  • Hyvinvointi
  • Lastenkirjat
  • Tositarinat
  • Uni ja rentoutuminen

Nextory

Tekijänoikeus © 2025 Nextory AB

Yksityisyyden suoja · Ehdot ·
Erinomainen4.3 / 5