Cyberspace Sovereignty: Reflections on building a community of common future in cyberspace

· Springer
Ebook
482
Pages
Ratings and reviews aren’t verified  Learn More

About this ebook

This book is the first one that comprehensively discusses cyberspace sovereignty in China, reflecting China’s clear attitude in the global Internet governance: respecting every nation’s right to independently choose a development path, cyber management modes and Internet public policies and to participate in the international cyberspace governance on an equal footing.

At present, the concept of cyberspace sovereignty is still very strange to many people, so it needs to be thoroughly analyzed. This book will not only help scientific and technical workers in the field of cyberspace security, law researchers and the public understand the development of cyberspace sovereignty at home and abroad, but also serve as reference basis for the relevant decision-making and management departments in their work.

About the author

Professor Fang Binxing is academician of Chinese Academy of Engineering, Former President of Beijing University of Posts and Telecommunications, principal representative of the 11th National People's Congress, the expert of information network and information security. He was born in 1960, graduated from Harbin Institute of Technology with doctor degree in 1989. He used to work at the National University of Defense Technology as a Post Doctor. He once was appointed as the Director and Chief Engineer of National Computer Network and Information Security Management Center, the Coordination Office Director of National Computer Network Emergency Response Technical Team/Coordination Center of China, Chairman of the Science and Technology Committee of the National Computer Network and Information Security Management Center, senior Engineer with professor title and PhD Supervisor. His main research area covers network security, information content security, parallel processing, and internet technology and so on. He is the first inventor who proposed the conception to build China National Network and Information Security Infrastructure and designed the practical corresponding system. Therefore he has successively won a first prize and two second prizes of State Scientific and Technological Progress Award. In the area of information security theory, he gave a unified formalization definition of the information security concept which involves physical security, operation security (network security), data security (narrow definition of information security) and content security. At the same time he is conducting research on the computability of the information security attribute.

Rate this ebook

Tell us what you think.

Reading information

Smartphones and tablets
Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.
Laptops and computers
You can listen to audiobooks purchased on Google Play using your computer's web browser.
eReaders and other devices
To read on e-ink devices like Kobo eReaders, you'll need to download a file and transfer it to your device. Follow the detailed Help Center instructions to transfer the files to supported eReaders.