Showing 501 - 520 results of 10,336 for search '"containment"', query time: 0.08s Refine Results
  1. 501
  2. 502
  3. 503
  4. 504
  5. 505
  6. 506
  7. 507
  8. 508
  9. 509

    The Huawei and Snowden Questions Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment? / by Lysne, Olav

    Published 2018
    Table of Contents: “…-- 4 Development of ICT Systems -- 5 Theoretical Foundation -- 6 Reverse Engineering of Code -- 7 Static Detection of Malware -- 8 Dynamic Detection Methods -- 9 Formal Methods -- 10 Software Quality and Quality Management -- 11 Containment of Untrusted Modules -- 12 Summary and Way Forward.…”
    Link to Metadata
    Electronic eBook
  10. 510
  11. 511
  12. 512
  13. 513
  14. 514
  15. 515
  16. 516
  17. 517
  18. 518
  19. 519
  20. 520