Loggen Sie sich ein, um 1-Click® einzuschalten.
Mit kostenloser Probeteilnahme bei Amazon Prime. Melden Sie sich während des Bestellvorgangs an.
Jetzt eintauschen
und EUR 0,10 Gutschein erhalten
Alle Angebote
Möchten Sie verkaufen? Hier verkaufen
Der Artikel ist in folgender Variante leider nicht verfügbar
Keine Abbildung vorhanden für
Keine Abbildung vorhanden

Den Verlag informieren!
Ich möchte dieses Buch auf dem Kindle lesen.

Sie haben keinen Kindle? Hier kaufen oder eine gratis Kindle Lese-App herunterladen.

21st Century Chinese Cyberwarfare [Englisch] [Taschenbuch]

It Governance , William T. Hagestad

Preis: EUR 59,92 kostenlose Lieferung Siehe Details.
  Alle Preisangaben inkl. MwSt.
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Nur noch 1 auf Lager (mehr ist unterwegs).
Verkauf und Versand durch Amazon. Geschenkverpackung verfügbar.
Lieferung bis Dienstag, 28. Oktober: Wählen Sie an der Kasse Morning-Express. Siehe Details.


März 2012
Military doctrine of The People's Republic of China (PRC) envisages war being waged in five spheres: land, sea, air, outer space and cyberspace. The PRC believes that the early degradation, or destruction, of an enemy's command and control infrastructure will significantly improve its chances of ultimate victory. But the Chinese 21st century approach to cyberwarfare is both more sophisticated and comprehensive than that. This book examines the military background to today's doctrines, and explores how the teachings of Sun Tzu (The Art of War), the Thirty-Six Principles from the Warring States era and the hard-learnt lessons of Mao's Long March infuse and support the modern state's approach to engaging with enemies and rivals. Chinese cyberwarriors, operating from behind the Great Firewall of China, have substantial campaign experience, and this book reviews operations from Titan Rain - sustained multi-year cyberattacks against the US that started in 2003 - to the most recent, ShadyRAT. This book also reviews the contributions made to the overall Chinese cyberstrategy by civilian hackers and state-owned enterprises and looks at how Advanced Persistent Threats already undermine many of China's rival states and enterprises. China's rivals lack a coherent cyberstrategy of their own. They also do not understand the complex cultural, political and historical routes of the modern Chinese state and this is a significant weakness. This book helps everyone with an interest in cybersecurity to 'know their enemy'. William Hagestad II is an internationally-recognized expert on the Chinese People's Liberation Army & Government information warfare. He advises international intelligence organizations, military flag officers and multi-national commercial enterprises with regard to their internal IT security governance and external security policies. The linguistic, historical, cultural, economic and military aspects of Chinese cyberwarfare are his forte.

Hinweise und Aktionen


In diesem Buch (Mehr dazu)
Ausgewählte Seiten ansehen
Buchdeckel | Copyright | Inhaltsverzeichnis | Auszug
Hier reinlesen und suchen:

Eine digitale Version dieses Buchs im Kindle-Shop verkaufen

Wenn Sie ein Verleger oder Autor sind und die digitalen Rechte an einem Buch haben, können Sie die digitale Version des Buchs in unserem Kindle-Shop verkaufen. Weitere Informationen


Es gibt noch keine Kundenrezensionen auf Amazon.de
5 Sterne
4 Sterne
3 Sterne
2 Sterne
1 Sterne
Die hilfreichsten Kundenrezensionen auf Amazon.com (beta)
Amazon.com: 4.6 von 5 Sternen  5 Rezensionen
6 von 6 Kunden fanden die folgende Rezension hilfreich
4.0 von 5 Sternen Great content but... 16. Juli 2012
Von Robert Leverton - Veröffentlicht auf Amazon.com
Verifizierter Kauf
The listing says 900 pages but the actual book is only 314 pages and that includes all the bibliography. There is no index. Of the books 314 pages 150 of them cover the described topic of Chinese cyber warfare.

The good news is that this is not a reprint of the Northrop Grumman Study recently done for the US Government and publically available. The bibliography of this book is extensive and supports the author's research. In addition, the author has a B.A. in Mandarin Chinese and other education related to China. Thus his review of documents written in Chinese is priceless for those of us who do not read Simplified or Traditional Chinese. Also, the author's military background is invaluable in understanding the nature of Chinese warfare strategies.

Would have liked more but this is a great find for those interested in this niche' topic.
6 von 6 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen original contribution to literature of cyberwarfare 30. März 2012
Von Mr. J. Curry - Veröffentlicht auf Amazon.com
Book Review of 21st Century Chinese Cyberwarfare

Having spent a lot of time looking at every conceivable method of gaming cyberwarfare (as opposed to just gaming an attack on a single network), I have read a lot of books on cyberwarfare. Most of these books are really about IT Security, not the strategic use of virtual means to interfere with the operations of another country. There are a few exceptions, e.g. Richard Clarke's book Cyber War. This book is another exception and makes a most interesting and original contribution to the subject of cyberwarfare.

To me, the book is a cross between a military text book and an IT Security book. The military part of the book covers Chinese military doctrine for conducting cyber operations, placing the Chinese method of conducting a virtual offensive soundly on a theoretical basis. It suggests Chinese principles of war, but in the cyberwarfare areana. It supports analysis with a detailed breakdown of the Chinese organisation / structures for conducting cyber operations, showing how the People's Liberation army, is supported by State Owned Enterprises and state sponsored hackers.

The IT Security part of the book has pages of examples that seek to support the idea that China is the world's first cyber superpower and they are exercising their weapons to further their national interest.

The book has some dark conclusions; saying the governments and organisations that say they have not had their IT security breached are either lying or they do not realise.

I finish my review with a large caveat (get out clause). I do not have sufficient knowledge to judge the accuracy of the book. I do not speak Mandarin. I do not have access to the Chinese military publications referred to. I did check out some of the claims of the book about individual security breaches and I found supporting evidence from the Internet. If the conclusions of the book are correct, this book is somewhat worrying reading.

The book is well worth reading for those interested in IT Security set in its wider importance.
3 von 3 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Extremely useful 10. Juli 2012
Von Curt - Veröffentlicht auf Amazon.com
As a practitioner of cyber defense, I have found Colonel Hagestad's extremely helpful in my personal education and I use it as a reference on a regular. I have had the pleasure of meeting Colonel Hagestad in person and he truly is the mostknowledgeable personal I have ever met on the subject of the Chinese and Cyber Warfare. I currently service at the United States Cyber Defense Liaison to NATO and in our recent meeting at NATO headquarters, I referenced the book often and many of my NATO colleagues are purchasing the book as soon as possible. My complements to Bill Hagestad for an excellent book and an invaluable resource.
1 von 1 Kunden fanden die folgende Rezension hilfreich
4.0 von 5 Sternen Great Book on a much overlooked topic 22. März 2014
Von GREG FLIEARMAN - Veröffentlicht auf Amazon.com
Verifizierter Kauf
This is a great book on a topic that is often overlooked in the world of IT Security. I've worked in IT for 20 years and I have always seen a very reactive posture by the security community. This is the first book that I have read that is constructed based on years of observation and analysis that provides a proactive assessment of the threat and helps a security professional to develop a plan for how to be prepared in advance.
1 von 1 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Changes the definition of Chinese Takeout 5. Oktober 2013
Von Lance Craver - Veröffentlicht auf Amazon.com
Verifizierter Kauf
Book sounded the alarm on PRC's political/economic/military/scientific/industrial motives. Takes Maoist principle of war using western capitalism/industry/greed against itself to destroy the west into the 21st Century. China dominates the the early 21st information age by embarking on an aggressive program of dominating information systems and technology through low production costs,minimal production disruption, and underpricing items compared to other country's products. Look at any laptop, hardware, circuits, routers, computer software, as well as other items entering the information community such as televisions and you will see the made in China stamp. This provided the PRC with massive export to import revenue, ability to counterfeit or reverse engineer items, and the ability to map topography. All while America was busy watching their I Phones, I Pads, TVs,gaming devices and/or the next best "thing". The PRC has bought out America's debt and "launched a cyber attack" shortly after to remind us who was the new big dog. We have gone from being the lead dog and while chasing profits found ourselves running right behind the lead dog and the view of of a the south end of a north bound dog is never pretty.
Waren diese Rezensionen hilfreich?   Wir wollen von Ihnen hören.

Kunden diskutieren

Das Forum zu diesem Produkt
Diskussion Antworten Jüngster Beitrag
Noch keine Diskussionen

Fragen stellen, Meinungen austauschen, Einblicke gewinnen
Neue Diskussion starten
Erster Beitrag:
Eingabe des Log-ins

Kundendiskussionen durchsuchen
Alle Amazon-Diskussionen durchsuchen

Ähnliche Artikel finden

Ihr Kommentar