Despite its impressive size and population, economic vitality, and drive to upgrade its military capabilities, China remains a vulnerable nation surrounded by powerful rivals and potential foes. The key to understanding China's foreign policy is to grasp these geostrategic challenges, which persist even as the country comes to dominate its neighbors. Andrew J. Nathan and Andrew Scobell analyze China's security concerns on four fronts: at home, with its immediate neighbors, in surrounding regional systems, and in the world beyond Asia. By illuminating the issues driving Chinese policy, they offer new perspective on China's rise and a strategy for balancing Chinese and American interests in Asia.
Though rooted in the present, Nathan and Scobell's study makes ample use of the past, reaching back into history to contextualize the people and institutions shaping Chinese strategy. They examine Chinese views of the United States; explain why China is so concerned about Japan; and uncover China's interests in such trouble spots as North Korea, Iran, and the Sudan. The authors probe recent troubles in Tibet and Xinjiang and establish links to forces beyond China's borders. They consider the tactics deployed by both sides of mainland China and Taiwan's complicated relationship, as Taiwan seeks to maintain autonomy while China tries to move toward unification, and they evaluate the strengths and weaknesses of China's three main power resources — economic power, military power, and soft power. The book concludes with recommendations for the United States as it seeks to manage China's rise. Chinese policymakers understand that the nation's prosperity, stability, and security depend on cooperation with the U.S, and if handled wisely, relations between the two countries could produce mutually beneficial outcomes in Asia and throughout the world.
Cyber Blockades is the first book to examine the phenomena of blockade operations in cyberspace, large-scale attacks on infrastructure or systems that aim to prevent an entire state from sending or receiving electronic data. Cyber blockades can take place through digital, physical, and/or electromagnetic means. Blockade operations have historically been considered acts of war, thus their emergence in cyberspace has significant implications for international law and for our understanding of cyber warfare.
The author defines and explains the emerging concept of “cyber blockades” and presents a unique comparison of blockade operations in five different domains—on land, at sea, in the air, in space, and in cyberspace—identifying common elements as well as important distinctions. Alison Lawlor Russell’s framework for defining cyber blockades, understanding how they occur, and considering the motivations of actors who employ them is applied with in-depth analysis of the cyber attacks on Estonia in 2007 and on Georgia during the 2008 Georgia-Russia War.
Continue reading “Cyber Blockades”
Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux
Overview Put the skills of the experts to the test with these tough and customisable pentesting projects Develop each challenge to suit your specific training, testing, or client engagement needs Hone your skills, from wireless attacks to social engineering, without the need to access live systems
As attackers develop more effective and complex ways to compromise computerized systems, penetration testing skills and tools are in high demand. A tester must have varied skills to combat these threats or fall behind. This book provides practical and customizable guides to set up a variety of exciting challenge projects that can then be tested with Kali Linux.
Learn how to create, customize, and exploit penetration testing scenarios and assault courses. Start by building flawed fortresses for Windows and Linux servers, allowing your testers to exploit common and not-so-common vulnerabilities to break down the gates and storm the walls. Mimic the human element with practical examples of social engineering projects. Facilitate vulnerable wireless and mobile installations and cryptographic weaknesses, and replicate the Heartbleed vulnerability. Finally, combine your skills and work to create a full red-team assessment environment that mimics the sort of corporate network encountered in the field.
What you will learn from this book Set up vulnerable services for both Windows and Linux Create dummy accounts for social engineering manipulation Set up Heartbleed replication for vulnerable SSL servers Develop full-size labs to challenge current and potential testers Construct scenarios that can be applied to Capture the Flag style challenges Add physical components to your scenarios and fire USB missile launchers at your opponents Challenge your own projects with a best-practice exploit guide to each scenario
Taking a highly practical approach and a playful tone, Kali Linux CTF Blueprints provides step-by-step guides to setting up vulnerabilities, in-depth guidance to exploiting them, and a variety of advice and ideas to build and customize your own challenges.
Who this book is written for
If you are a penetration testing team leader or individual who wishes to challenge yourself or your friends in the creation of penetration testing assault courses, this is the book for you. The book assumes a basic level of penetration skills and familiarity with the Kali Linux operating system.