Showing 261 - 280 results of 1,861 for search '"The Forward"', query time: 0.06s Refine Results
  1. 261
  2. 262
  3. 263

    The Huawei and Snowden Questions Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment? / by Lysne, Olav

    Published 2018
    Table of Contents: “…-- 4 Development of ICT Systems -- 5 Theoretical Foundation -- 6 Reverse Engineering of Code -- 7 Static Detection of Malware -- 8 Dynamic Detection Methods -- 9 Formal Methods -- 10 Software Quality and Quality Management -- 11 Containment of Untrusted Modules -- 12 Summary and Way Forward.…”
    Link to Metadata
    Electronic eBook
  4. 264
  5. 265
  6. 266
  7. 267
  8. 268
  9. 269
  10. 270
  11. 271
  12. 272
  13. 273
  14. 274
  15. 275
  16. 276
  17. 277
  18. 278
  19. 279
  20. 280