Cyberspace  Sovereignty -  Binxing Fang

Cyberspace Sovereignty (eBook)

Reflections on building a community of common future in cyberspace

(Autor)

eBook Download: PDF
2018 | 1st ed. 2018
XXXIX, 482 Seiten
Springer Singapore (Verlag)
978-981-13-0320-3 (ISBN)
Systemvoraussetzungen
96,29 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This book is the first one that comprehensively discusses cyberspace sovereignty in China, reflecting China's clear attitude in the global Internet governance: respecting every nation's right to independently choose a development path, cyber management modes and Internet public policies and to participate in the international cyberspace governance on an equal footing.

At present, the concept of cyberspace sovereignty is still very strange to many people, so it needs to be thoroughly analyzed. This book will not only help scientific and technical workers in the field of cyberspace security, law researchers and the public understand the development of cyberspace sovereignty at home and abroad, but also serve as reference basis for the relevant decision-making and management departments in their work.



Professor Fang Binxing is academician of Chinese Academy of Engineering, Former President of Beijing University of Posts and Telecommunications, principal representative of the 11th National People's Congress, the expert of information network and information security. He was born in 1960, graduated from Harbin Institute of Technology with doctor degree in 1989. He used to work at the National University of Defense Technology as a Post Doctor. He once was appointed as the Director and Chief Engineer of National Computer Network and Information Security Management Center, the Coordination Office Director of National Computer Network Emergency Response Technical Team/Coordination Center of China, Chairman of the Science and Technology Committee of the National Computer Network and Information Security Management Center, senior Engineer with professor title and PhD Supervisor. His main research area covers network security, information content security, parallel processing, and internet technology and so on. He is the first inventor who proposed the conception to build China National Network and Information Security Infrastructure and designed the practical corresponding system. Therefore he has successively won a first prize and two second prizes of State Scientific and Technological Progress Award. In the area of information security theory, he gave a unified formalization definition of the information security concept which involves physical security, operation security (network security), data security (narrow definition of information security) and content security. At the same time he is conducting research on the computability of the information security attribute.
This book is the first one that comprehensively discusses cyberspace sovereignty in China, reflecting China's clear attitude in the global Internet governance: respecting every nation's right to independently choose a development path, cyber management modes and Internet public policies and to participate in the international cyberspace governance on an equal footing. At present, the concept of cyberspace sovereignty is still very strange to many people, so it needs to be thoroughly analyzed. This book will not only help scientific and technical workers in the field of cyberspace security, law researchers and the public understand the development of cyberspace sovereignty at home and abroad, but also serve as reference basis for the relevant decision-making and management departments in their work.

Professor Fang Binxing is academician of Chinese Academy of Engineering, Former President of Beijing University of Posts and Telecommunications, principal representative of the 11th National People's Congress, the expert of information network and information security. He was born in 1960, graduated from Harbin Institute of Technology with doctor degree in 1989. He used to work at the National University of Defense Technology as a Post Doctor. He once was appointed as the Director and Chief Engineer of National Computer Network and Information Security Management Center, the Coordination Office Director of National Computer Network Emergency Response Technical Team/Coordination Center of China, Chairman of the Science and Technology Committee of the National Computer Network and Information Security Management Center, senior Engineer with professor title and PhD Supervisor. His main research area covers network security, information content security, parallel processing, and internet technology and so on. He is the first inventor who proposed the conception to build China National Network and Information Security Infrastructure and designed the practical corresponding system. Therefore he has successively won a first prize and two second prizes of State Scientific and Technological Progress Award. In the area of information security theory, he gave a unified formalization definition of the information security concept which involves physical security, operation security (network security), data security (narrow definition of information security) and content security. At the same time he is conducting research on the computability of the information security attribute.

Chapter 1  The Definitions of Fundamental Concepts.- Chapter 2  Understanding of the Traditional Sovereignty Concept.- Chapter 3  Interpretation of the Concept of “Cyberspace Sovereignty”.- Chapter 4  Necessities for Advocating Cyberspace Sovereignty.- Chapter 5  The Relationship between Cyberspace Sovereignty and Internet Stakeholders.- Chapter 6  China’s Declaration of Cyberspace Sovereignty.- Chapter 7  Objective Existence of Cyberspace Sovereignty in Countries’ Affairs.- Chapter 8  Positions of States toward Cyberspace and Cyber-relating Regulations.- Chapter 9  Scientific Basis for Maintaining Cyberspace Sovereignty.- Chapter 10  Extension of Cyberspace Sovereignty.- Chapter 11  Conflicts of Cyberspace Sovereignty Concept.- Chapter 12  Main Initiatives to Safeguard Cyberspace Sovereignty.- Chapter 13  Conclusion.

Erscheint lt. Verlag 29.5.2018
Zusatzinfo XXXIX, 482 p.
Verlagsort Singapore
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Sozialwissenschaften Politik / Verwaltung Europäische / Internationale Politik
Wirtschaft Betriebswirtschaft / Management Unternehmensführung / Management
Schlagworte cyber security • Cyberspace • CYBERSPACE SOVEREIGNTY • international • Sovereignty
ISBN-10 981-13-0320-7 / 9811303207
ISBN-13 978-981-13-0320-3 / 9789811303203
Haben Sie eine Frage zum Produkt?
Wie bewerten Sie den Artikel?
Bitte geben Sie Ihre Bewertung ein:
Bitte geben Sie Daten ein:
PDFPDF (Wasserzeichen)
Größe: 5,5 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das umfassende Handbuch

von Michael Kofler; Klaus Gebeshuber; Peter Kloep …

eBook Download (2022)
Rheinwerk Computing (Verlag)
49,90
Umfassendes Sicherheits-, Kontinuitäts- und Risikomanagement mit …

von Klaus-Rainer Müller

eBook Download (2023)
Springer Vieweg (Verlag)
79,99