<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="titles.xsl"?>
<record
    biblionix-libraryname="Giddings Public Library"
    biblionix-libraryid="1549"
    biblionix-libraryusername="giddingspubliclibrary"
    xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
    xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd"
    xmlns="http://www.loc.gov/MARC21/slim">

  <leader>03125cam a2200373 i 4500</leader>
  <controlfield tag="001">2661357268</controlfield>
  <controlfield tag="003">TxAuBib</controlfield>
  <controlfield tag="005">20260121120000.0</controlfield>
  <controlfield tag="008">250603s2025||||||||||||||||||||||||eng|u</controlfield>
  <datafield tag="020" ind1=" " ind2=" ">
    <subfield code="a">9780063451834</subfield>
    <subfield code="q">hardcover</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
    <subfield code="a">0063451832</subfield>
    <subfield code="q">hardcover</subfield>
  </datafield>
  <datafield tag="035" ind1=" " ind2=" ">
    <subfield code="a">(OCoLC)1521988538</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
    <subfield code="d">TxAuBib</subfield>
    <subfield code="e">rda</subfield>
  </datafield>
  <datafield tag="100" ind1="1" ind2=" ">
    <subfield code="a">Shedd, David R.,</subfield>
    <subfield code="e">Author.</subfield>
  </datafield>
  <datafield tag="245" ind1="1" ind2="4">
    <subfield code="a">The Great Heist :</subfield>
    <subfield code="b">China’s Epic Campaign to Steal America's Secrets /</subfield>
    <subfield code="c">David R. Shedd &amp; Andrew Badger.</subfield>
  </datafield>
  <datafield tag="250" ind1=" " ind2=" ">
    <subfield code="a">First edition.</subfield>
  </datafield>
  <datafield tag="264" ind1=" " ind2="1">
    <subfield code="a">New York, NY : </subfield>
    <subfield code="b">Harper, </subfield>
    <subfield code="c">[2025]</subfield>
  </datafield>
  <datafield tag="264" ind1=" " ind2="4">
    <subfield code="c">©2025.</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
    <subfield code="a">xiii, 343 pages ;</subfield>
    <subfield code="c">24 cm.</subfield>
  </datafield>
  <datafield tag="336" ind1=" " ind2=" ">
    <subfield code="b">txt</subfield>
    <subfield code="2">rdacontent</subfield>
  </datafield>
  <datafield tag="337" ind1=" " ind2=" ">
    <subfield code="b">n</subfield>
    <subfield code="2">rdamedia</subfield>
  </datafield>
  <datafield tag="338" ind1=" " ind2=" ">
    <subfield code="b">nc</subfield>
    <subfield code="2">rdacarrier</subfield>
  </datafield>
  <datafield tag="500" ind1=" " ind2=" ">
    <subfield code="a">"The Story the CCP Does Not Want Revealed" - on the cover.</subfield>
  </datafield>
  <datafield tag="504" ind1=" " ind2=" ">
    <subfield code="a">Includes bibliographical references (pages 305-330) and index.</subfield>
  </datafield>
  <datafield tag="505" ind1=" " ind2=" ">
    <subfield code="a">The billion-dollar thumb drive -- Foreshadowings -- The great leap everywhere -- Inside China's intelligence labyrinth -- The playbook exposed -- The attack of the clones -- Crossed circuits: The electric vehicle wars -- Chip spy wars -- Telecommunications -- Artificially subsidized intelligence -- Sneak attacks on the department of defense -- Hard lessons in hypersonics and national security -- Financial instruments of destruction: Venture capital and private equity -- The health care assault -- The elements of infiltration: The American chemical sector -- Energy: Gale force theft -- The seeds of agri-espionage -- Inside the situation room: Stopping the great heist -- Boardroom blitz.</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
    <subfield code="a">"The Great Heist exposes China's unprecedented state-orchestrated espionage campaign to strip the United States and its allies of their economic, technological, and military edge. Through a coordinated "whole-of-society" strategy, the Chinese Communist Party has dramatically expanded its covert operations to acquire America's most valuable innovations--stealing defense secrets and proprietary technology from companies like Boeing, Lockheed Martin, Google, T-Mobile, and Tesla. By exploiting both human and cyber vulnerabilities, China has quietly looted the crown jewels of Western technology, saving itself trillions in R&amp;D costs since the 1990s--with an ongoing brazenness fueled by decades of Western inaction. Drawing on exclusive investigations and interviews with intelligence officers, corporate security teams, senior policymakers, and espionage victims, David R. Shedd and Andrew Badger reveal how industrial theft has fueled China's meteoric rise from Third World backwater to global superpower--and present a bold strategic playbook to turn the tide in the greatest economic contest of our time."--</subfield>
    <subfield code="c">Provided by publisher.</subfield>
  </datafield>
  <datafield tag="541" ind1=" " ind2=" ">
    <subfield code="d">20260121.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2=" ">
    <subfield code="a">Business intelligence.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2=" ">
    <subfield code="a">Confidential business information.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2=" ">
    <subfield code="a">Espionage, Chinese.</subfield>
  </datafield>
  <datafield tag="651" ind1=" " ind2=" ">
    <subfield code="a">China</subfield>
    <subfield code="x">Foreign economic relations</subfield>
    <subfield code="z">United States.</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="a">Badger, Andrew,</subfield>
    <subfield code="e">Author.</subfield>
  </datafield>
  <datafield tag="949" ind1=" " ind2=" ">
    <subfield code="a">TXGID</subfield>
  </datafield>
</record>