Search Results: 'china cyber warfare'

Search

×
×
×
×
4 results for "china cyber warfare"
Communist Chinese Cyber-Attacks, Cyber-Espionage and Theft of American Technology By Subcommittee on Oversight and Investigations of the Committee on Foreign Affairs House of Representatives
eBook (ePub): $8.99
The United States is under attack. Cyber-attack and cyber-espionage traced backed to China have been dramatically increasing every year. What kind of damage is being done? How is our national... More > security being compromised? The Office of the Secretary of Defense in their 2010 annual report to Congress, which was the "Military and Security Developments Involving the People's Republic of China [PRC]"; outlined this challenge: "The PRC utilizes a large well-organized network of enterprises, defense factories and affiliated research institutes and computer network operations to facilitate the collection of sensitive information and export-controlled technology." The heavy use of outsourcing of computer and consumer electronic production to China, not only by American but also by Japanese, Taiwanese, German, and South Korean firms, has helped create a Chinese cyber threat that now compromises the security of the Western world.< Less
The Chinese People’s Liberation Army And Information Warfare By Larry M. Wortzel et al.
Paperback: $16.50
Prints in 3-5 business days
On November 23, 2013, China’s Ministry of National Defense spokesman announced that a new air defense intercept zone (ADIZ) will be established by the government to include the Diaoyu, or... More > Senkaku Islands. Sovereignty over these islands is disputed by Japan, China, and Taiwan. The new ADIZ also included a submerged rock that falls inside overlapping Exclusive Economic Zones (EEZ) claimed by China, Japan, and South Korea. Pundits and policy analysts quickly engaged in a broad debate about whether China’s expanded ADIZ is designed to create tension in Asia, or is part of a broader plan to impose a new definition of China’s territorial space in the Asia-Pacific region. Meanwhile, to deal with cyber penetrations attributed to the Chinese People’s Liberation Army (PLA), the U.S. Departments of Justice, Homeland Security, and State are devising new means to protect intellectual property and secrets from the PLA’s computer network operations.< Less
The Dark Visitor (paperback) By Scott Henderson
eBook (PDF): $9.38
(2 Ratings)
This book attempts to analyze the history, ideology, organization, exploits, and political motivations of the Chinese hacker network. Whenever possible, the information contained herein has been... More > taken directly from the Chinese hacker organization itself or from interviews with individual members.< Less
The Dark Visitor (paperback) By Scott Henderson
Paperback: $16.84
Prints in 3-5 business days
(2 Ratings)
This book attempts to analyze the history, ideology, organization, exploits, and political motivations of the Chinese hacker network. Whenever possible, the information contained herein has been... More > taken directly from the Chinese hacker organization itself or from interviews with individual members.< Less