21st Century Chinese Cyberwarfare

21st Century Chinese Cyberwarfare
  • The first book to expose the extent of Chinese cyberwarfare, giving readers an understanding of how it might affect them or their organisation.
  • Covers the motivation of cyberwarfare, helping organisations to understand the nature of the threats they face.
  • Buy this book and learn the strategies used by China in the global cyberwar.
Ready to order
Sub Total: R 0,00 (ZAR)

Other payment options available


Understand China's cyberwarfare

21st Century Chinese Cyberwarfare presents the salient information regarding the use of cyberwarfare doctrine by the People's Republic of China to promote its own interests and enforce its will on other nations, and draws from a combination of business, cultural, historical and linguistic sources, as well as the author's personal experience, to attempt to explain China to the uninitiated. The author argues that the threat of Chinese cyberwarfare can no longer be ignored, that it is a clear and present danger to organisations of all shapes and sizes, and that it will be economically, societally and culturally damaging for the nations that are targeted.

Product overview

Those that will benefit from the book include: law enforcement agencies; international information security professionals; IT professionals; military professionals; government policy makers and corporate managers. In particular, the book discusses:

  • statistics of the Chinese cyber threat.
  • Chinese government cyber initiatives.
  • understanding the key motivators for government-sponsored cyberwarfare.
  • commercial enterprises as a cyber threat vector.
  • nationalistic threats of Chinese hackers.


1. The Chinese Cyberthreat
2. Evolution of Chinese Cyberwarfare
3. Chinese Unrestricted Warfare
4. Principles of Warfare – West versus East
5. Nature of Information Warfare
6. Chinese Cyberwarfare Doctrines
7. China's SIGINT Capabilities
8. Chinese IW Capabilities
9. The Chinese IW Organizational Structure
10. Chinese Commercial Enterprises
11. Commercial Objectives of Chinese Cyberattacks
12. Chinese Civilian Hackers
13. The Chinese Cyberthreat: Conclusions
Appendix A: China & the Internet – A history
Appendix B: Chinese Cyberactivism in the Spotlight
Appendix C: China's Informization Campaign
Appendix D: General Wang Pufeng's Challenge of Information Warfare
Appendix E: Chinese Hacker Website Resources
Appendix F: Huawei's Statement on Establishing a Global Cybersecurity Assurance System

About the author

Lieutenant Colonel William Hagestad is recognised internationally as an expert on the Chinese People's Liberation Army and government information warfare. He advises international intelligence organisations, military flag officers, and multi-national commercial enterprises on their internal IT security governance and external security policies. He currently speaks both domestically and internationally on the Chinese cyber threat.

Buy today, in any format. We’ll send you a download link right away, or dispatch today for swift delivery to your selected destination.

Publisher: IT Governance Publishing
ISBN: 9781849283342
Pages: 364
Format: Softcover
Published date: 5 March 2012
Availability: In stock

Product Rating: (5.00)   # of Ratings: 1   (Only registered customers can rate)

(Only registered customers can rate)

1 - Terrible
2 - Bad
3 - OK
4 - Good
5 - Great
0% 50% 100%

Sort: New to Old RE-SORT COMMENTS:

Showing comments 1-1 of 1
1. Mr. J. Curry on 12/10/2015, said:

To me, the book is a cross between a military text book and an IT Security book. The military part of the book covers Chinese military doctrine for conducting cyber operations, placing the Chinese method of conducting a virtual offensive soundly on a theoretical basis. It suggests Chinese principles of war, but in the cyberwarfare areana. It supports analysis with a detailed breakdown of the Chinese organisation / structures for conducting cyber operations, showing how the People's Liberation army, is supported by State Owned Enterprises and state sponsored hackers. The book is well worth reading for those interested in IT Security set in its wider importance.
Was this comment helpful? yes no   (0 people found this comment helpful, 0 did not)
Showing comments 1-1 of 1