pickabook books with huge discounts for everyone
pickabook books with huge discounts for everyone
Visit our new collection website www.collectionsforschool.co.uk
     
Email: Subscribe to news & offers:
Need assistance? Log In/Register


Item Details
Title: 21ST CENTURY CHINESE CYBERWARFARE
By: IT Governance Publishing (Editor)
Format: Hardback

List price: £49.95


We currently do not stock this item, please contact the publisher directly for further information.

ISBN 10: 1849283346
ISBN 13: 9781849283342
Publisher: IT GOVERNANCE PUBLISHING
Pub. date: 29 February, 2012
Pages: 911
Description: Understand 21st Century Chinese Cyber Warfare and Confront the Red Dragon Cybersecurity A Government, Organizational and Public Risk The UKs 2010 National Security Strategy identified Cyberattacks as one of the four highest-priority risks faced by the UK. President Obama has declared cybersecurity as one of the most serious economic and national security challenges the US faces as a nation. While usually targeted on specific government or private sector organizations, cyberattacks can, and will, happen to anyone. At the lower level, attacks are more widespread and are initially automated and indiscriminate any organization with an Internet presence will be scanned, potentially targeted and attacked. Advanced Persistent Threats There is an Advanced Persistence Threat (APT) posed by organized crime and state level entities, targeting large multi-national corporations and foreign governments, with the objective of steali
Synopsis: Military doctrine of The People's Republic of China (PRC) envisages war being waged in five spheres: land, sea, air, outer space and cyberspace. The PRC believes that the early degradation, or destruction, of an enemy's command and control infrastructure will significantly improve its chances of ultimate victory. But the Chinese 21st century approach to cyberwarfare is both more sophisticated and comprehensive than that. This book examines the military background to today's doctrines, and explores how the teachings of Sun Tzu (The Art of War), the Thirty-Six Principles from the Warring States era and the hard-learnt lessons of Mao's Long March infuse and support the modern state's approach to engaging with enemies and rivals. Chinese cyberwarriors, operating from behind the Great Firewall of China, have substantial campaign experience, and this book reviews operations from Titan Rain - sustained multi-year cyberattacks against the US that started in 2003 - to the most recent, ShadyRAT.This book also reviews the contributions made to the overall Chinese cyberstrategy by civilian hackers and state-owned enterprises and looks at how Advanced Persistent Threats already undermine many of China's rival states and enterprises. China's rivals lack a coherent cyberstrategy of their own. They also do not understand the complex cultural, political and historical routes of the modern Chinese state and this is a significant weakness. This book helps everyone with an interest in cybersecurity to 'know their enemy'. William Hagestad II is an internationally-recognized expert on the Chinese People's Liberation Army & Government information warfare. He advises international intelligence organizations, military flag officers and multi-national commercial enterprises with regard to their internal IT security governance and external security policies. The linguistic, historical, cultural, economic and military aspects of Chinese cyberwarfare are his forte.
Illustrations: black & white illustrations
Publication: UK
Imprint: IT Governance Publishing
Returns: Non-returnable
Some other items by this author:
30 KEY QUESTIONS THAT UNLOCK MANAGEMENT (PB)
50 TOP IT PROJECT MANAGEMENT CHALLENGES (PB)
A GUIDE TO EFFECTIVE INTERNAL MANAGEMENT SYSTEM AUDITS (PB)
A MANAGER'S GUIDE TO ISO22301 (PB)
AGILE (PB)
AGILE GOVERNANCE AND AUDIT (PB)
AGILE PRODUCTIVITY UNLEASHED (PB)
AGILE SAP (PB)
AN INTRODUCTION TO ANTI-BRIBERY MANAGEMENT SYSTEMS (PB)
AN INTRODUCTION TO INFORMATION SECURITY AND ISO 27001 (PB)
ASSESSING IT PROJECTS TO ENSURE SUCCESSFUL OUTCOMES (PB)
AVAILABILITY AND CAPACITY MANAGEMENT IN THE CLOUD (PB)
BREAKING THE ADDICTION TO PROCESS (PB)
BUILD A SECURITY CULTURE (PB)
BUSINESS CONTINUITY AND THE PANDEMIC THREAT (PB)
BUSINESS CONTINUITY MANAGEMENT (PB)
BUSINESS MANAGEMENT CONTROLS (PB)
CHANGING THE IT LEADER'S MINDSET (PB)
CLOUD SECURITY AND GOVERNANCE (PB)
COMPLIANCE BY DESIGN (PB)
COMPUTER FORENSICS (PB)
COPING WITH UNPLANNED ABSENCES (PB)
CRITICAL ISSUES SERIES - CYBER SECURITY (PB)
CYBER RISKS FOR BUSINESS PROFESSIONALS (PB)
CYBERWAR, CYBERTERROR, CYBERCRIME (PB)
DATA PROTECTION AND THE CLOUD (PB)
DATA PROTECTION COMPLIANCE IN THE UK (PB)
DIRECTING THE AGILE ORGANIZATION (PB)
DISASTER RECOVERY AND BUSINESS CONTINUITY (PB)
E-MAIL SECURITY (PB)
ESSENTIAL TIME MANAGEMENT AND ORGANISATION (PB)
EU GDPR & EU-US PRIVACY SHIELD (PB)
EU GDPR (PB)
EU GENERAL DATA PROTECTION REGULATION (GDPR) (PB)
EVERYTHING YOU WANT TO KNOW ABOUT AGILE (PB)
EVERYTHING YOU WANT TO KNOW ABOUT BUSINESS CONTINUITY (PB)
EVERYTHING YOU WANT TO KNOW ABOUT ORGANISATIONAL CHANGE (PB)
EXPLODING THE MYTHS SURROUNDING ISO9000 (PB)
FUNDAMENTALS OF INFORMATION RISK MANAGEMENT AUDITING (PB)
GOVERNANCE AND INTERNAL CONTROLS FOR CUTTING EDGE IT (PB)
GOVERNANCE OF ENTERPRISE IT BASED ON COBIT 5 (PB)
GREEN IT IN PRACTICE (PB)
HOW TO USE WEB 2.0 AND SOCIAL NETWORKING SITES SECURELY (PB)
ILLUSTRATING PRINCE2 PROJECT MANAGEMENT IN REAL TERMS (PB)
IMPLEMENTIERUNG VON SERVICE-QUALITA BASIEREND AUF ISO/IEC 20000
IMPLEMENTING SERVICE QUALITY BASED ON ISO/IEC 20000 (PB)
IN HINDSIGHT (PB)
INFORMATION SECURITY A PRACTICAL GUIDE (PB)
INFORMATION SECURITY BREACHES (PB)
INFORMATION SECURITY RISK MANAGEMENT FOR ISO 27001/ISO27002 (PB)
INTEGRATED MEASUREMENT - KPIS AND METRICS FOR ITSM (PB)
ISO 19770 SOFTWARE ASSET MANAGEMENT (PB)
ISO/IEC 20000 (PB)
ISO14001 STEP BY STEP (PB)
ISO22301: A POCKET GUIDE (PB)
ISO27000 AND INFORMATION SECURITY (PB)
ISO27001 ASSESSMENT WITHOUT TEARS (PB)
ISO27001/ISO27002 (PB)
IT ASSET MANAGEMENT (PB)
IT GOVERNANCE TO DRIVE HIGH PERFORMANCE (PB)
IT INDUCTION AND INFORMATION SECURITY AWARENESS: A POCKET GUIDE (PB)
IT PROJECT MANAGEMENT (PB)
IT STRATEGIC AND OPERATIONAL CONTROLS (PB)
IT'S ALL ABOUT RELATIONSHIPS
ITIL AND ORGANIZATIONAL CHANGE (PB)
ITIL FOUNDATION ESSENTIALS (PB)
ITIL LIFECYCLE ESSENTIALS (PB)
MANAGING BUSINESS TRANSFORMATION (PB)
MANAGING INFORMATION SECURITY BREACHES (PB)
MEASURING YOUR IT (PB)
NINE STEPS TO SUCCESS: AN ISO 27001 IMPLEMENTATION OVERVIEW (PB)
OHSAS 18001 STEP BY STEP (PB)
ONCE MORE UNTO THE BREACH: MANAGING INFORMATION SECURITY IN AN UNCERTAIN WORLD (PB)
PCI DSS (PB)
PCI DSS A PRACTICAL GUIDE TO IMPLEMENTING AND MAINTAINING COMPLIANCE (PB)
PENETRATION TESTING (PB)
PRAGMATIC APPLICATION OF SERVICE MANAGEMENT (PB)
PROJECT GOVERNANCE (PB)
RELEASE AND DEPLOYMENT (PB)
RESILIENT THINKING (PB)
REVIEWING IT IN DUE DILIGENCE (PB)
SECURING CLOUD SERVICES (PB)
SECURITY (PB)
SELECTION MANAGEMENT FOR SYSTEMS AND SERVICES (PB)
SELLING INFORMATION SECURITY TO THE BOARD (PB)
SERVICE LEVEL AGREEMENTS (PB)
SHAREPOINT GOVERNANCE TOOLKIT (CD)
SOCIALMEDIA TOOLKIT (CD)
SOFTWARE LIFE CYCLE MANAGEMENT STANDARDS (PB)
SWANSON ON INTERNAL AUDITING (PB)
TEN STEPS TO ITSM SUCCESS (PB)
THE CASE FOR ISO 27001 (PB)
THE CHIEF INFORMATION SECURITY OFFICER (PB)
THE CONCISE PRINCE2 (PB)
THE DEFINITIVE GUIDE TO IT SERVICE METRICS (PB)
THE ITSM IRON TRIANGLE (PB)
THE POWER OF THE AGILE BUSINESS ANALYST (PB)
THE PSYCHOLOGY OF INFORMATION SECURITY (PB)
THE QUANTUM AGE OF IT (PB)
THE SECURITY CONSULTANT'S HANDBOOK (PB)
THE TAO OF OPEN SOURCE INTELLIGENCE (PB)
THE TRUE COST OF INFORMATION SECURITY BREACHES AND CYBER CRIME (PB)
TURNING HEADS AND CHANGING MINDS (PB)
TWO-FACTOR AUTHENTICATION (PB)
VALIDATING YOUR BUSINESS CONTINUITY PLAN (PB)
WEB APPLICATION SECURITY IS A STACK (PB)

TOP SELLERS IN THIS CATEGORY
Data Driven Security (Paperback)
John Wiley & Sons Inc
Our Price : £34.19
more details
Official (ISC)2 Guide to the CISSP CBK (Hardback)
Apple Academic Press Inc.
Our Price : £59.39
more details
Web Application Security ()
O''Reilly Media
Our Price : £38.68
more details
BTEC Nationals Information Technology (Mixed media product)
Pearson Education Limited
Our Price : £29.84
more details
The Art of Deception (Paperback)
John Wiley & Sons Inc
Our Price : £7.30
more details
BROWSE FOR BOOKS IN RELATED CATEGORIES
 COMPUTING AND INFORMATION TECHNOLOGY
 computer communications & networking
 network security


Information provided by www.pickabook.co.uk
SHOPPING BASKET
  
Your basket is empty
  Total Items: 0
 

NEW
Ramadan and Eid al-Fitr A celebratory, inclusive and educational exploration of Ramadan and Eid al-Fitr for both children that celebrate and children who want to understand and appreciate their peers who do.
add to basket

Learning
That''s My Story!: Drama for Confidence, Communication and C... The ability to communicate is an essential life skill for all children, underpinning their confidence, personal and social wellbeing, and sense of self.
add to basket