Feedback

X
The Huawei and Snowden Questions: Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?

The Huawei and Snowden Questions: Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?

en

0 Ungluers have Faved this Work
cyber security; IT management; computer science; computer engineering; digital vulnerability

This book is included in DOAB.

Why read this book? Have your say.

You must be logged in to comment.

Rights Information

Are you the author or publisher of this work? If so, you can claim it as yours by registering as an Unglue.it rights holder.

Downloads

This work has been downloaded 55 times via unglue.it ebook links.
  1. 55 - pdf (CC BY) at OAPEN Library.

Keywords

  • Computer engineering
  • Computer science
  • Computing & information technology
  • cyber security
  • digital vulnerability
  • IT management
  • thema EDItEUR::U Computing and Information Technology::UY Computer science

Links

DOI: 10.1007/978-3-319-74950-1

Editions

edition cover

Share

Copy/paste this into your site: