Explore
The Huawei and Snowden Questions: Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?
Olav Lysne
2018
0 Ungluers have
Faved this Work
Login to Fave
cyber security; IT management; computer science; computer engineering; digital vulnerability
This book is included in DOAB.
Why read this book? Have your say.
You must be logged in to comment.
Rights Information
Are you the author or publisher of this work? If so, you can claim it as yours by registering as an Unglue.it rights holder.Downloads
This work has been downloaded 65 times via unglue.it ebook links.
- 65 - pdf (CC BY) at OAPEN Library.
Keywords
- Computer engineering
- Computer science
- Computing & information technology
- cyber security
- digital vulnerability
- IT management
- thema EDItEUR::U Computing and Information Technology::UY Computer science