Chinese Industrial Espionage: Technology Acquisition and Military Modernisation: Asian Security Studies
Autor William C. Hannas, James Mulvenon, Anna B. Puglisien Limba Engleză Paperback – 15 mai 2013
Based on primary sources and meticulously researched, the book lays bare China’s efforts to prosper technologically through others' achievements. For decades, China has operated an elaborate system to spot foreign technologies, acquire them by all conceivable means, and convert them into weapons and competitive goods—without compensating the owners. The director of the US National Security Agency recently called it "the greatest transfer of wealth in history."
Written by two of America's leading government analysts and an expert on Chinese cyber networks, this book describes these transfer processes comprehensively and in detail, providing the breadth and depth missing in other works. Drawing upon previously unexploited Chinese language sources, the authors begin by placing the new research within historical context, before examining the People’s Republic of China’s policy support for economic espionage, clandestine technology transfers, theft through cyberspace and its impact on the future of the US.
This book will be of much interest to students of Chinese politics, Asian security studies, US defence, US foreign policy and IR in general.
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 407.65 lei 6-8 săpt. | |
Taylor & Francis – 15 mai 2013 | 407.65 lei 6-8 săpt. | |
Hardback (1) | 1150.17 lei 6-8 săpt. | |
Taylor & Francis – 15 mai 2013 | 1150.17 lei 6-8 săpt. |
Din seria Asian Security Studies
- Preț: 296.95 lei
- 13% Preț: 296.70 lei
- Preț: 436.61 lei
- 18% Preț: 1035.66 lei
- 26% Preț: 850.13 lei
- Preț: 479.42 lei
- 15% Preț: 687.83 lei
- Preț: 411.88 lei
- 26% Preț: 766.55 lei
- 18% Preț: 690.57 lei
- 18% Preț: 1150.17 lei
- 18% Preț: 1041.41 lei
- 13% Preț: 325.00 lei
- 18% Preț: 1197.37 lei
- 13% Preț: 297.16 lei
- 13% Preț: 295.73 lei
- Preț: 381.57 lei
- 18% Preț: 1036.64 lei
- 26% Preț: 763.82 lei
- 18% Preț: 1038.01 lei
- 18% Preț: 1039.36 lei
- 18% Preț: 1252.77 lei
- Preț: 401.24 lei
- 26% Preț: 815.18 lei
- 22% Preț: 322.82 lei
- 18% Preț: 1096.82 lei
- Preț: 442.26 lei
- 18% Preț: 1036.31 lei
- Preț: 409.82 lei
- 18% Preț: 1256.51 lei
- 18% Preț: 1143.88 lei
- Preț: 434.73 lei
- Preț: 315.56 lei
- 26% Preț: 763.43 lei
- 18% Preț: 1146.75 lei
- 18% Preț: 1041.08 lei
- 18% Preț: 1141.64 lei
- 26% Preț: 820.21 lei
Preț: 407.65 lei
Nou
Puncte Express: 611
Preț estimativ în valută:
78.04€ • 81.12$ • 64.70£
78.04€ • 81.12$ • 64.70£
Carte tipărită la comandă
Livrare economică 05-19 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780415821421
ISBN-10: 0415821428
Pagini: 320
Ilustrații: 7 black & white tables, 1 black & white line drawings
Dimensiuni: 156 x 234 x 17 mm
Greutate: 0.45 kg
Ediția:New.
Editura: Taylor & Francis
Colecția Routledge
Seria Asian Security Studies
Locul publicării:Oxford, United Kingdom
ISBN-10: 0415821428
Pagini: 320
Ilustrații: 7 black & white tables, 1 black & white line drawings
Dimensiuni: 156 x 234 x 17 mm
Greutate: 0.45 kg
Ediția:New.
Editura: Taylor & Francis
Colecția Routledge
Seria Asian Security Studies
Locul publicării:Oxford, United Kingdom
Public țintă
Postgraduate, Professional, and UndergraduateCuprins
Introduction 1. China’s History of Relying on Western Technology 2. China’s Use of Open Sources 3. Trade for Technology 4. PRC-based Technology Transfer Organizations 5. US-based Technology Transfer Organizations 6. China’s Foreign Students in the United States 7. Bringing Technology ‘Back’ to China 8. Traditional Chinese Espionage 9. Chinese Cyber Espionage 10. Chinese Industrial Espionage in Context Conclusion Appendices
Notă biografică
William C. Hannas has an MA from the University of Chicago in Chinese and a PhD from the University of Pennsylvania in Asian languages. He served with the US Navy and Joint Special Operations Command, taught at Georgetown University, and holds a senior executive position in a component of the US federal government. Hannas is author of Asia’s Orthographic Dilemma (1997) and The Writing on the Wall: How Asian Orthography Curbs Creativity (2003).
James Mulvenon is Vice-President of Defense Group, Inc.’s Intelligence Division and Director of DGI’s Center for Intelligence Research and Analysis. Trained as a Chinese linguist, he is a leading expert on Chinese cyber issues, and has published widely on Chinese military affairs, party-army relations, C4ISR, and nuclear weapons doctrine and organizations. He has a PhD in political science from the University of California, Los Angeles, and is author of Soldiers of Fortune (2000).
Anna B. Puglisi has an MPA and MS in environmental science from Indiana University, has worked in research and technical infrastructure, and now holds a senior analyst position in a component of the US federal government. Ms. Puglisi studied at the Princeton in Beijing Chinese language school and was a visiting scholar in Nankai University’s Department of Economics, where she studied China’s S&T policies, infrastructure development, and university reforms.
James Mulvenon is Vice-President of Defense Group, Inc.’s Intelligence Division and Director of DGI’s Center for Intelligence Research and Analysis. Trained as a Chinese linguist, he is a leading expert on Chinese cyber issues, and has published widely on Chinese military affairs, party-army relations, C4ISR, and nuclear weapons doctrine and organizations. He has a PhD in political science from the University of California, Los Angeles, and is author of Soldiers of Fortune (2000).
Anna B. Puglisi has an MPA and MS in environmental science from Indiana University, has worked in research and technical infrastructure, and now holds a senior analyst position in a component of the US federal government. Ms. Puglisi studied at the Princeton in Beijing Chinese language school and was a visiting scholar in Nankai University’s Department of Economics, where she studied China’s S&T policies, infrastructure development, and university reforms.
Recenzii
‘In a book likely to annoy and please in equal measure, the authors use Chinese-language sources, often from public policy documents, to describe a system that has at its core not the attention-grabbing issue of cyberespionage, but human-based, meticulous, often open-source acquisition that involves multiple actors at all levels of the party and state, and appeals to the patriotism of Chinese abroad.' -- New York Times
‘In a book likely to annoy and please in equal measure, the authors use Chinese-language sources, often from public policy documents, to describe a system that has at its core not the attention-grabbing issue of cyberespionage, but human-based, meticulous, often open-source acquisition that involves multiple actors at all levels of the party and state, and appeals to the patriotism of Chinese abroad.' -- New York Times
'This book rings alarm bells about technology theft on a scale that the authors say is unprecedented in history and that they believe has strategic implications.' -- Foreign Affairs
‘In a book likely to annoy and please in equal measure, the authors use Chinese-language sources, often from public policy documents, to describe a system that has at its core not the attention-grabbing issue of cyberespionage, but human-based, meticulous, often open-source acquisition that involves multiple actors at all levels of the party and state, and appeals to the patriotism of Chinese abroad.' -- New York Times
'This book rings alarm bells about technology theft on a scale that the authors say is unprecedented in history and that they believe has strategic implications.' -- Foreign Affairs
Descriere
Written by two of America's leading government analysts and an expert on Chinese cyber networks, this new book is the first full account, inside or outside government, of China’s efforts to acquire foreign technology.