Huawei and snowden questions (Record no. 29127)

000 -LEADER
fixed length control field nam a22 7a 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 180713b xxu||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783319749495
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number LYS
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Lysne, Olav
245 ## - TITLE STATEMENT
Title Huawei and snowden questions
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Name of publisher, distributor, etc Springer
Date of publication, distribution, etc 2018
Place of publication, distribution, etc Switzerland
300 ## - PHYSICAL DESCRIPTION
Extent xiv, 116 p.
Dimensions 23 cm.
365 ## - TRADE PRICE
Price type code EUR
Price amount 19.99/ Rs. 1653.17
520 ## - SUMMARY, ETC.
Summary, etc Preliminary This book is open access under a CC BY 4.0 license. This book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted vendors? Secondly, can I build trust into my products in such a way that I support verification by untrusting customers? In separate chapters the book takes readers through the state of the art in fields of computer science that can shed light on these questions. In a concluding chapter it discusses realistic ways forward. In discussions on cyber security, there is a tacit assumption that the manufacturer of equipment will collaborate with the user of the equipment to stop third-party wrongdoers. The Snowden files and recent deliberations on the use of Chinese equipment in the critical infrastructures of western countries have changed this. The discourse in both cases revolves around what malevolent manufacturers can do to harm their own customers, and the importance of the matter is on par with questions of national security. This book is of great interest to ICT and security professionals who need a clear understanding of the two questions posed in the subtitle, and to decision-makers in industry, national bodies and nation states.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
Topical term or geographic name as entry element Information technology -- Security measures
Topical term or geographic name as entry element Internet of things -- Security measures
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent location Current location Date acquired Full call number Barcode Date last seen Koha item type
          DAIICT DAIICT 2018-07-13 005.8 LYS 031582 2018-07-13 Books

Powered by Koha