Kapitel
Öffentlich zugänglich
Final conclusions
-
Kristan Stoddart
Kapitel in diesem Buch
- Frontmatter I
- Acknowledgments v
- Contents ix
- List of abbreviations and concepts xiii
- Introduction 1
- Chapter 1 Decoding the dragon: Chinese theories of cyberespionage and cyberwarfare 44
- Chapter 2 China: critical infrastructure pre-positioning and holding it “at risk” 110
- Chapter 3 Chinese intellectual property theft: “the greatest transfer of wealth in history” 172
- Chapter 4 IP theft, military modernization, and China’s rise 213
- Final conclusions 264
- Appendix 311
- Bibliography[1]
- Index
Kapitel in diesem Buch
- Frontmatter I
- Acknowledgments v
- Contents ix
- List of abbreviations and concepts xiii
- Introduction 1
- Chapter 1 Decoding the dragon: Chinese theories of cyberespionage and cyberwarfare 44
- Chapter 2 China: critical infrastructure pre-positioning and holding it “at risk” 110
- Chapter 3 Chinese intellectual property theft: “the greatest transfer of wealth in history” 172
- Chapter 4 IP theft, military modernization, and China’s rise 213
- Final conclusions 264
- Appendix 311
- Bibliography[1]
- Index