Kapitel
Lizenziert
Nicht lizenziert
Erfordert eine Authentifizierung
Chapter 2 China: critical infrastructure pre-positioning and holding it “at risk”
-
Kristan Stoddart
Sie haben derzeit keinen Zugang zu diesem Inhalt.
Sie haben derzeit keinen Zugang zu diesem Inhalt.
Kapitel in diesem Buch
- Frontmatter I
- Acknowledgments
- Contents ix
- List of abbreviations and concepts
- Introduction 1
- Chapter 1 Decoding the dragon: Chinese theories of cyberespionage and cyberwarfare 44
- Chapter 2 China: critical infrastructure pre-positioning and holding it “at risk” 110
- Chapter 3 Chinese intellectual property theft: “the greatest transfer of wealth in history” 172
- Chapter 4 IP theft, military modernization, and China’s rise 213
- Final conclusions 264
- Appendix 311
- Bibliography[1]
- Index
Kapitel in diesem Buch
- Frontmatter I
- Acknowledgments
- Contents ix
- List of abbreviations and concepts
- Introduction 1
- Chapter 1 Decoding the dragon: Chinese theories of cyberespionage and cyberwarfare 44
- Chapter 2 China: critical infrastructure pre-positioning and holding it “at risk” 110
- Chapter 3 Chinese intellectual property theft: “the greatest transfer of wealth in history” 172
- Chapter 4 IP theft, military modernization, and China’s rise 213
- Final conclusions 264
- Appendix 311
- Bibliography[1]
- Index