Please use this identifier to cite or link to this item: http://localhost/handle/Hannan/1166
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAustin, Greg. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:26:01Z-
dc.date.available2020-05-17T08:26:01Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319684369 ;en_US
dc.identifier.isbn9783319684352 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1166-
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.description005.74 ; 23 ;en_US
dc.descriptionPrinted edition: ; 9783319684352. ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book offers the first benchmarking study of Chinaees response to the problems of security in cyber space. There are several useful descriptive books on cyber security policy in China published between 2010 and 2016. As a result, we know quite well the system for managing cyber security in China, and the history of policy responses. What we doneet know so well, and where this book is useful, is how capable China has become in this domain relative to the rest of the world. This book is a health check, a report card, on Chinaees cyber security system in the face of escalating threats from criminal gangs and hostile states. The book also offers an assessment of the effectiveness of Chinaees efforts. It lays out the major gaps and shortcomings in Chinaees cyber security policy. It is the first book to base itself around an assessment of Chinaees cyber industrial complex, concluding that China does not yet have one. As Xi Jinping said in July 2016, the countryees core technologies are dominated by foreigners. ;en_US
dc.description.statementofresponsibilityby Greg Austin.en_US
dc.description.tableofcontentsPreface -- The Cybersecurity Ecosystem -- Education in Cyber Security- Chinese Views of the Cyber Industrial Complex -- Corporate Cyber Security -- Cyber Insecurity.of Chinese Citizens- Governmental Cybersecurity -- Grading National Cybersecurity -- The Next Wave. ;en_US
dc.format.extentXXI, 130 p. 1 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesSpringerBriefs in Cybersecurity, ; 2193-973X. ;en_US
dc.relation.ispartofseriesSpringerBriefs in Cybersecurity, ; 2193-973X. ;en_US
dc.relation.haspart9783319684369.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectPublic policy. ;en_US
dc.subjectManagement Information Systemsen_US
dc.subjectInternational criminal law. ;en_US
dc.subjectElectronics. ;en_US
dc.subjectMicroelectronics. ;en_US
dc.subjectComputer Scienceen_US
dc.subjectManagement of Computing and Information Systems. ;en_US
dc.subjectPublic Policy. ;en_US
dc.subjectInternational Criminal Law. ;en_US
dc.subjectElectronics and Microelectronics, Instrumentation. ;en_US
dc.subject.lccQA76.9.M3 ;en_US
dc.titleCybersecurity in Chinaen_US
dc.title.alternativeThe Next Wave /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319684369.pdf1.74 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAustin, Greg. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:26:01Z-
dc.date.available2020-05-17T08:26:01Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319684369 ;en_US
dc.identifier.isbn9783319684352 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1166-
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.description005.74 ; 23 ;en_US
dc.descriptionPrinted edition: ; 9783319684352. ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book offers the first benchmarking study of Chinaees response to the problems of security in cyber space. There are several useful descriptive books on cyber security policy in China published between 2010 and 2016. As a result, we know quite well the system for managing cyber security in China, and the history of policy responses. What we doneet know so well, and where this book is useful, is how capable China has become in this domain relative to the rest of the world. This book is a health check, a report card, on Chinaees cyber security system in the face of escalating threats from criminal gangs and hostile states. The book also offers an assessment of the effectiveness of Chinaees efforts. It lays out the major gaps and shortcomings in Chinaees cyber security policy. It is the first book to base itself around an assessment of Chinaees cyber industrial complex, concluding that China does not yet have one. As Xi Jinping said in July 2016, the countryees core technologies are dominated by foreigners. ;en_US
dc.description.statementofresponsibilityby Greg Austin.en_US
dc.description.tableofcontentsPreface -- The Cybersecurity Ecosystem -- Education in Cyber Security- Chinese Views of the Cyber Industrial Complex -- Corporate Cyber Security -- Cyber Insecurity.of Chinese Citizens- Governmental Cybersecurity -- Grading National Cybersecurity -- The Next Wave. ;en_US
dc.format.extentXXI, 130 p. 1 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesSpringerBriefs in Cybersecurity, ; 2193-973X. ;en_US
dc.relation.ispartofseriesSpringerBriefs in Cybersecurity, ; 2193-973X. ;en_US
dc.relation.haspart9783319684369.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectPublic policy. ;en_US
dc.subjectManagement Information Systemsen_US
dc.subjectInternational criminal law. ;en_US
dc.subjectElectronics. ;en_US
dc.subjectMicroelectronics. ;en_US
dc.subjectComputer Scienceen_US
dc.subjectManagement of Computing and Information Systems. ;en_US
dc.subjectPublic Policy. ;en_US
dc.subjectInternational Criminal Law. ;en_US
dc.subjectElectronics and Microelectronics, Instrumentation. ;en_US
dc.subject.lccQA76.9.M3 ;en_US
dc.titleCybersecurity in Chinaen_US
dc.title.alternativeThe Next Wave /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319684369.pdf1.74 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAustin, Greg. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:26:01Z-
dc.date.available2020-05-17T08:26:01Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319684369 ;en_US
dc.identifier.isbn9783319684352 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1166-
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.description005.74 ; 23 ;en_US
dc.descriptionPrinted edition: ; 9783319684352. ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book offers the first benchmarking study of Chinaees response to the problems of security in cyber space. There are several useful descriptive books on cyber security policy in China published between 2010 and 2016. As a result, we know quite well the system for managing cyber security in China, and the history of policy responses. What we doneet know so well, and where this book is useful, is how capable China has become in this domain relative to the rest of the world. This book is a health check, a report card, on Chinaees cyber security system in the face of escalating threats from criminal gangs and hostile states. The book also offers an assessment of the effectiveness of Chinaees efforts. It lays out the major gaps and shortcomings in Chinaees cyber security policy. It is the first book to base itself around an assessment of Chinaees cyber industrial complex, concluding that China does not yet have one. As Xi Jinping said in July 2016, the countryees core technologies are dominated by foreigners. ;en_US
dc.description.statementofresponsibilityby Greg Austin.en_US
dc.description.tableofcontentsPreface -- The Cybersecurity Ecosystem -- Education in Cyber Security- Chinese Views of the Cyber Industrial Complex -- Corporate Cyber Security -- Cyber Insecurity.of Chinese Citizens- Governmental Cybersecurity -- Grading National Cybersecurity -- The Next Wave. ;en_US
dc.format.extentXXI, 130 p. 1 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesSpringerBriefs in Cybersecurity, ; 2193-973X. ;en_US
dc.relation.ispartofseriesSpringerBriefs in Cybersecurity, ; 2193-973X. ;en_US
dc.relation.haspart9783319684369.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectPublic policy. ;en_US
dc.subjectManagement Information Systemsen_US
dc.subjectInternational criminal law. ;en_US
dc.subjectElectronics. ;en_US
dc.subjectMicroelectronics. ;en_US
dc.subjectComputer Scienceen_US
dc.subjectManagement of Computing and Information Systems. ;en_US
dc.subjectPublic Policy. ;en_US
dc.subjectInternational Criminal Law. ;en_US
dc.subjectElectronics and Microelectronics, Instrumentation. ;en_US
dc.subject.lccQA76.9.M3 ;en_US
dc.titleCybersecurity in Chinaen_US
dc.title.alternativeThe Next Wave /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319684369.pdf1.74 MBAdobe PDFThumbnail
Preview File