The Huawei and Snowden Questions: Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?
cyber security; IT management; computer science; computer engineering; digital vulnerability
Saved in:
Main Author: | |
---|---|
Format: | Electronic Book Chapter |
Language: | English |
Published: |
Cham
Springer Nature
2018
|
Series: | Simula SpringerBriefs on Computing
4 |
Subjects: | |
Online Access: | OAPEN Library: download the publication OAPEN Library: description of the publication |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Internet
OAPEN Library: download the publicationOAPEN Library: description of the publication
3rd Floor Main Library
Call Number: |
A1234.567 |
---|---|
Copy 1 | Available |