Under the Nuclear Shadow China's Information-Age Weapons in International Security

booksz

U P L O A D E R
ca7a0b62f0c76073604195570b8fd1f6.webp

Free Download Under the Nuclear Shadow: China's Information-Age Weapons in International Security (Princeton Studies in International History and Politics) by Fiona S. Cunningham
English | January 7th, 2025 | ISBN: 0691261032 | 400 pages | True EPUB | 4.15 MB
How and why China has pursued information-age weapons to gain leverage against its adversaries

How can states use military force to achieve their political aims without triggering a catastrophic nuclear war? Among the states facing this dilemma of fighting limited wars, only China has given information-age weapons such a prominent role. While other countries have preferred the traditional options of threatening to use nuclear weapons or fielding capabilities for decisive conventional military victories, China has instead chosen to rely on offensive cyber operations, counterspace capabilities, and precision conventional missiles to coerce its adversaries. In Under the Nuclear Shadow, Fiona Cunningham examines this distinctive aspect of China's post-Cold War deterrence strategy, developing an original theory of "strategic substitution." When crises with the United States highlighted the inadequacy of China's existing military capabilities, Cunningham argues, China pursued information-age weapons that promised to rapidly provide credible leverage against adversaries.
Drawing on hundreds of original Chinese-language sources and interviews with security experts in China, Cunningham provides a rare and candid glimpse from Beijing into the information-age technologies that are reshaping how states gain leverage in the twenty-first century. She offers unprecedented insights into the trajectory of China's military modernization, as she details the strengths and weaknesses of China's strategic substitution approach. Under the Nuclear Shadow also looks ahead at the uncertain future of China's strategic substitution approach and briefly explores too how other states might seize upon the promise of emerging technologies to address weaknesses in their own military strategies.


Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Links are Interchangeable - Single Extraction
 
Kommentar

In der Börse ist nur das Erstellen von Download-Angeboten erlaubt! Ignorierst du das, wird dein Beitrag ohne Vorwarnung gelöscht. Ein Eintrag ist offline? Dann nutze bitte den Link  Offline melden . Möchtest du stattdessen etwas zu einem Download schreiben, dann nutze den Link  Kommentieren . Beide Links findest du immer unter jedem Eintrag/Download.

Data-Load.me | Data-Load.ing | Data-Load.to | Data-Load.in

Auf Data-Load.me findest du Links zu kostenlosen Downloads für Filme, Serien, Dokumentationen, Anime, Animation & Zeichentrick, Audio / Musik, Software und Dokumente / Ebooks / Zeitschriften. Wir sind deine Boerse für kostenlose Downloads!

Ist Data-Load legal?

Data-Load ist nicht illegal. Es werden keine zum Download angebotene Inhalte auf den Servern von Data-Load gespeichert.
Oben Unten