Home Page Icon
Home Page
Table of Contents for
Cover
Close
Cover
by Daniel Ventre
Chinese Cybersecurity and Cyberdefense
Cover
Contents
Title Page
Copyright
Author Biographies
Introduction
1 China’s Internet Development and Cybersecurity – Policies and Practices
1.1. Introduction
1.2. Internet development in China: an overview
1.3. China’s policies towards Internet development
1.4. Cyber legislation and Internet administration
1.5. Cybersecurity and diplomacy: an international perspective
1.6. A cybersecurity strategy in the making?
1.7. Conclusion
2 PLA Views on Informationized Warfare, Information Warfare and Information Operations
2.1. The evolution of chinese military thinking
2.2. The growing importance of information
2.3. Information operations
2.4. Key types of information operations
2.5. Computer network warfare and information operations
3 China’s Adaptive Internet Management Strategy after the Emergence of Social Networks
3.1. Weibo: the turning point
3.2. Latest adjustments under Xi Jinping
3.3. Bibliography
4 India’s Cybersecurity – The Landscape
4.1. A snapshot of Asian cyberspace
4.2. The Indian cyber landscape
4.3. The China challenge: a case study
4.4. Responses
4.5. Creating an institutional framework
4.6. Takeaways
5 China and Southeast Asia: Offline Information Penetration and Suspicions of Online Hacking – Strategic Implications from a Singaporean Perspective
5.1. Offline sphere: latent “diasporic” information power and official Chinese soft power
5.2. The online sphere: hacktivism as mostly projections
5.3. Conclusion: offline politics strategically obscure online projections
5.4. Bibliography
6 Impact of Mongolia’s Choices in International Politics on Cybersecurity
6.1. Mongolia’s cyberspace
6.2. Cyberspace and political stakes
6.3. Information-space security policy
7 China-Iran-Russia – A Cybercommunity of Information?
7.1. The hall marks of cyber-cooperation
7.2. The geopolitical bases for the cyber-Mongol empire
7.3. Order in cyberspace: an absolute necessity within China
8 Discourse Regarding China: Cyberspace and Cybersecurity
8.1. Identification of prevailing themes
8.2. The evolution of American discourse about China, Cybersecurity and cyberdefense
8.3. Conclusion
General Conclusion
List of Authors
Index
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Next
Next Chapter
Contents
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset