logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

The Huawei And Snowden Questions Can Electronic Equipment From Untrusted Vendors Be Verified 1st Olav Lysne

  • SKU: BELL-6858348
The Huawei And Snowden Questions Can Electronic Equipment From Untrusted Vendors Be Verified 1st Olav Lysne
$ 31.00 $ 45.00 (-31%)

4.1

80 reviews

The Huawei And Snowden Questions Can Electronic Equipment From Untrusted Vendors Be Verified 1st Olav Lysne instant download after payment.

Publisher: Springer
File Extension: PDF
File size: 2.42 MB
Pages: 116
Author: Olav Lysne
ISBN: 9783319749495, 3319749498
Language: English
Year: 2018
Edition: 1st

Product desciption

The Huawei And Snowden Questions Can Electronic Equipment From Untrusted Vendors Be Verified 1st Olav Lysne by Olav Lysne 9783319749495, 3319749498 instant download after payment.

Preliminary

This book is open access under a CC BY 4.0 license.

This book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted vendors? Secondly, can I build trust into my products in such a way that I support verification by untrusting customers?  In separate chapters the book takes readers through the state of the art in fields of computer science that can shed light on these questions. In a concluding chapter it discusses realistic ways forward.  

In discussions on cyber security, there is a tacit assumption that the manufacturer of equipment will collaborate with the user of the equipment to stop third-party wrongdoers. The Snowden files and recent deliberations on the use of Chinese equipment in the critical infrastructures of western countries have changed this. The discourse in both cases revolves around what malevolent manufacturers can do to harm their own customers, and the importance of the matter is on par with questions of national security.

This book is of great interest to ICT and security professionals who need a clear understanding of the two questions posed in the subtitle, and to decision-makers in industry, national bodies and nation states.

 

Related Products