Asia
Select regional store:

We're sorry but that page cannot be found

Please use the links above to find what you were looking for.

You may not have been able to visit your page because of:

   1. An out-of-date bookmark/favourite
   2. A search engine that has an out-of-date listing
   3. A mistyped address
   4. You have no access to this page
   5. The requested resource was not found.
   6. An error has occurred while processing your request.

Are you looking for:

21st Century Chinese Cyberwarfare

Understand China's cyberwarfare

21st Century Chinese Cyberwarfare presents the salient information regarding the use of cyberwarfare doctrine by the People's Republic of China to promote its own interests and enforce its will on other nations. It draws from a combination of business, cultural, historical, and linguistic sources, as well as the author's personal experience, to attempt to explain China to the uninitiated. The author argues that the threat of Chinese cyberwarfare can no longer be ignored, that it is a clear and present danger to organizations of all shapes and sizes, and that it will be economically, societally and culturally damaging for the nations that are targeted.

Product overview

Those that will benefit from the book include: law enforcement agencies, international information security professionals, IT professionals, military professionals, government policy makers and corporate managers. In particular, the book discusses:

  • statistics of the Chinese cyber threat.
  • Chinese government cyber initiatives.
  • understanding the key motivators for government-sponsored cyberwarfare.
  • commercial enterprises as a cyber threat vector.
  • nationalistic threats of Chinese hackers.

Contents

1. The Chinese Cyberthreat

2. Evolution of Chinese Cyberwarfare

3. Chinese Unrestricted Warfare

4. Principles of Warfare – West versus East

5. Nature of Information Warfare

6. Chinese Cyberwarfare Doctrines

7. China's SIGINT Capabilities

8. Chinese IW Capabilities

9. The Chinese IW Organizational Structure

10. Chinese Commercial Enterprises

11. Commercial Objectives of Chinese Cyberattacks

12. Chinese Civilian Hackers

13. The Chinese Cyberthreat: Conclusions

Appendix A: China & the Internet – A history

Appendix B: Chinese Cyberactivism in the Spotlight

Appendix C: China's Informization Campaign

Appendix D: General Wang Pufeng's Challenge of Information Warfare

Appendix E: Chinese Hacker Website Resources

Appendix F: Huawei's Statement on Establishing a Global Cybersecurity Assurance System

About the author

Lieutenant Colonel William Hagestad is recognized internationally as an expert on the Chinese People's Liberation Army and government information warfare. He advises international intelligence organizations, military flag officers, and multi-national commercial enterprises on their internal IT security governance and external security policies. He currently speaks both domestically and internationally on the Chinese cyber threat.

Buy today, in any format. We’ll send you a download link right away or ship it today for swift delivery to your selected destination.

IT Service Management Books

Browse IT Service Management Books in the leading UK and international IT service management bookshop

50 Top IT Project Management Challenges

A summary of the challenges facing today’s IT project manager

Discussions on project management forums highlight many of the challenges facing a project manager during the course of a project. Unclear requirements, scope creep, and undefined roles are well-trodden issues that can derail a project. Other challenges are less obvious, often more subtle, but equally destructive.

Facing up to the challenges

This book offers a focused and concise summary of 50 challenges facing today’s IT project manager. The authors draw on years of practical experience (rather than classroom theory) to outline these challenges and offer useful tips and advice on how to deal with them.

Challenge and response

Readers of this book will be better equipped to respond to key project management challenges, including

  • Building the team—getting the right resources, matching skills/knowledge, defining roles and responsibilities.
  • Project scope—clarifying assumptions, avoiding ambiguity, getting the time/cost estimates right.
  • Politics—communicating with management and stakeholders, dealing with conflict, handling interference and micro-managing.
  • Risk awareness—identifying inside/outside influences, recognizing inbound and outbound dependencies.
  • Time management—using the right planning tools, balancing work versus meetings.
  • Failure—handling the blame game, protecting the team, rescuing the project.

This book condenses into a handy summary much of the information and advice that can be found in project management-related books and discussion forums. It is an ideal reference for anyone involved in IT project management, from professional service organizations (PSO) and project management offices (PMO) through to active project managers and studying graduates. 

Buy this book and deliver your next project on time, on budget, and to specification

About the authors

Premanand Doraiswamy has over 14 years’ experience working in IT project management with Fortune 500 companies in various industries and is the author of IT Project Management – 30 Steps to Success, also published by IT Governance.

Premi Shiv is a quality assurance specialist with 7 years’ experience in IT processes and management solutions. With an optimistic approach and organizational skills, she has carved a niche in quality assurance.

             
To hear about new books and exclusive offers from IT Governance Publishing, sign up and select "Books" from the New Products options.

A Manager’s Guide to ISO22301

BCM involves managing risks to ensure that mission-critical functions continue to provide an acceptable level of service, even in the event of a major disaster.

Implementing a BCMS that complies with the international standard ISO 22301 ensures your organisation can provide a minimum acceptable service despite a disruption, and helps preserve corporate reputation and revenue.

A Manager’s Guide to ISO22301 provides essential guidance to help successfully develop and implement an ISO 22301-compliant BCMS.

 

Successfully implement an ISO 22301 BCMS with this practical guide

This book is the essential companion guide for those working in business continuity who are looking to introduce or optimise a BCMS aligned with ISO 22301, the only credible framework for effective BCM in the world.

Look inside this book >>

 

It provides a comprehensive introduction to business continuity, including:

  • How to develop and implement a business continuity plan based on ISO 22301;
  • The business continuity strategy, procedures and documentation;
  • The importance of exercising, testing and evaluation;
  • How to identify a nonconformity of the BCMS; and
  • The benefits of achieving ISO 22301 certification.

 

About the author

Tony Drewitt has specialised in operational risk management and BCM since 2001, working with organisations of all sizes to help them develop their BCM policies, strategies and plans. Tony was one of the first practitioners to achieve certification under BS 25999 and is currently working with several organisations to develop management systems in line with ISO 22301. He has written several books on business continuity, including ISO22301: A Pocket Guide and Everything You Want to Know About Business Continuity.

IT Service Management Consultancy

Discover how our bespoke IT Service Management consultancy services can help you evaluate and improve your ITSM system, adopt ITIL best practices and achieve ISO20000 certification.

This website uses cookies. View our cookie policy
Loading...