Cybersecurity in China

The Next Wave

Business & Finance, Industries & Professions, Information Management, Nonfiction, Social & Cultural Studies, Political Science, Government, Public Policy, Computers, General Computing
Cover of the book Cybersecurity in China by Greg Austin, Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Greg Austin ISBN: 9783319684369
Publisher: Springer International Publishing Publication: May 15, 2018
Imprint: Springer Language: English
Author: Greg Austin
ISBN: 9783319684369
Publisher: Springer International Publishing
Publication: May 15, 2018
Imprint: Springer
Language: English

This book offers the first benchmarking study of China’s response to the problems of security in cyber space. There are several useful descriptive books on cyber security policy in China published between 2010 and 2016. As a result, we know quite well the system for managing cyber security in China, and the history of policy responses. What we don’t know so well, and where this book is useful, is how capable China has become in this domain relative to the rest of the world. This book is a health check, a report card, on China’s cyber security system in the face of escalating threats from criminal gangs and hostile states. The book also offers an assessment of the effectiveness of China’s efforts. It lays out the major gaps and shortcomings in China’s cyber security policy. It is the first book to base itself around an assessment of China’s cyber industrial complex, concluding that China does not yet have one. As Xi Jinping said in July 2016, the country’s core technologies are dominated by foreigners.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book offers the first benchmarking study of China’s response to the problems of security in cyber space. There are several useful descriptive books on cyber security policy in China published between 2010 and 2016. As a result, we know quite well the system for managing cyber security in China, and the history of policy responses. What we don’t know so well, and where this book is useful, is how capable China has become in this domain relative to the rest of the world. This book is a health check, a report card, on China’s cyber security system in the face of escalating threats from criminal gangs and hostile states. The book also offers an assessment of the effectiveness of China’s efforts. It lays out the major gaps and shortcomings in China’s cyber security policy. It is the first book to base itself around an assessment of China’s cyber industrial complex, concluding that China does not yet have one. As Xi Jinping said in July 2016, the country’s core technologies are dominated by foreigners.

More books from Springer International Publishing

Cover of the book Clarifying and Furthering Existential Psychotherapy by Greg Austin
Cover of the book Re-Constructing the Man of Steel by Greg Austin
Cover of the book A Multivariate Claim Count Model for Applications in Insurance by Greg Austin
Cover of the book Energy, Risk and Governance by Greg Austin
Cover of the book Technological Change and Skill Development in Arab Gulf Countries by Greg Austin
Cover of the book VoIP and PBX Security and Forensics by Greg Austin
Cover of the book Surviving the 21st Century by Greg Austin
Cover of the book Energy Law in Brazil by Greg Austin
Cover of the book Self- and Co-regulation in Cybercrime, Cybersecurity and National Security by Greg Austin
Cover of the book Success and Failure of IS/IT Projects by Greg Austin
Cover of the book Persuasive Technology: Development of Persuasive and Behavior Change Support Systems by Greg Austin
Cover of the book The Dialogical Self Theory in Education by Greg Austin
Cover of the book Affect-Language Interactions in Native and Non-Native English Speakers by Greg Austin
Cover of the book Interactive Governance for Small-Scale Fisheries by Greg Austin
Cover of the book Cross-Cultural Design. Methods, Tools, and Users by Greg Austin
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy