Show simple item record

dc.contributor.authorLysne, Olav
dc.date.accessioned2018-10-01 23:55:55
dc.date.accessioned2020-03-18 13:36:15
dc.date.accessioned2020-04-01T12:03:30Z
dc.date.available2020-04-01T12:03:30Z
dc.date.issued2018
dc.identifier1002212
dc.identifierOCN: 1026406740en_US
dc.identifier.urihttp://library.oapen.org/handle/20.500.12657/27793
dc.description.abstractcyber security; IT management; computer science; computer engineering; digital vulnerability
dc.languageEnglish
dc.relation.ispartofseriesSimula SpringerBriefs on Computing
dc.subject.classificationthema EDItEUR::U Computing and Information Technology::UY Computer scienceen_US
dc.subject.othercyber security
dc.subject.otherIT management
dc.subject.othercomputer science
dc.subject.othercomputer engineering
dc.subject.otherdigital vulnerability
dc.titleThe Huawei and Snowden Questions: Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?
dc.typebook
oapen.identifier.doi10.1007/978-3-319-74950-1
oapen.relation.isPublishedBy6c6992af-b843-4f46-859c-f6e9998e40d5
oapen.relation.isbn9783319749501
oapen.series.number4
oapen.place.publicationCham
oapen.identifier.ocn1026406740


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record