The Huawei and Snowden Questions: Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment? (Record no. 43699)

MARC details
000 -LEADER
fixed length control field 01629naaaa2200325uu 4500
001 - CONTROL NUMBER
control field https://directory.doabooks.org/handle/20.500.12854/26719
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 978-3-319-74950-1
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783319749501
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-3-319-74950-1
Terms of availability doi
041 0# - LANGUAGE CODE
Language code of text/sound track or separate title English
042 ## - AUTHENTICATION CODE
Authentication code dc
072 #7 - SUBJECT CATEGORY CODE
Subject category code UY
Source bicssc
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Lysne, Olav
Relationship auth
245 10 - TITLE STATEMENT
Title The Huawei and Snowden Questions: Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Cham
Name of publisher, distributor, etc. Springer Nature
Date of publication, distribution, etc. 2018
506 0# - RESTRICTIONS ON ACCESS NOTE
Terms governing access Open Access
Source of term star
Standardized terminology for access restriction Unrestricted online access
520 ## - SUMMARY, ETC.
Summary, etc. cyber security; IT management; computer science; computer engineering; digital vulnerability
540 ## - TERMS GOVERNING USE AND REPRODUCTION NOTE
Terms governing use and reproduction Creative Commons
Use and reproduction rights https://creativecommons.org/licenses/by/4.0/
Source of term cc
-- https://creativecommons.org/licenses/by/4.0/
546 ## - LANGUAGE NOTE
Language note English
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer science
Source of heading or term bicssc
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term cyber security
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term IT management
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term computer science
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term computer engineering
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term digital vulnerability
856 40 - ELECTRONIC LOCATION AND ACCESS
Host name www.oapen.org
Uniform Resource Identifier <a href="https://library.oapen.org/bitstream/20.500.12657/27793/1/1002212.pdf">https://library.oapen.org/bitstream/20.500.12657/27793/1/1002212.pdf</a>
Access status 0
Public note DOAB: download the publication
856 40 - ELECTRONIC LOCATION AND ACCESS
Host name www.oapen.org
Uniform Resource Identifier <a href="https://library.oapen.org/bitstream/20.500.12657/27793/1/1002212.pdf">https://library.oapen.org/bitstream/20.500.12657/27793/1/1002212.pdf</a>
Access status 0
Public note DOAB: download the publication
856 40 - ELECTRONIC LOCATION AND ACCESS
Host name www.oapen.org
Uniform Resource Identifier <a href="https://library.oapen.org/bitstream/20.500.12657/27793/1/1002212.pdf">https://library.oapen.org/bitstream/20.500.12657/27793/1/1002212.pdf</a>
Access status 0
Public note DOAB: download the publication
856 40 - ELECTRONIC LOCATION AND ACCESS
Host name www.oapen.org
Uniform Resource Identifier <a href="https://directory.doabooks.org/handle/20.500.12854/26719">https://directory.doabooks.org/handle/20.500.12854/26719</a>
Access status 0
Public note DOAB: description of the publication

No items available.