This is an interim version of our Electronic Legal Deposit Catalogue-eJournals and eBooks while we continue to recover from a cyber-attack.
The Huawei and Snowden questions : Can electronic equipment from untrusted vendors be verified? Can an untrusted vendor build trust into electronic equipment? /: Can electronic equipment from untrusted vendors be verified? Can an untrusted vendor build trust into electronic equipment?. (2018)
Record Type:
Book
Title:
The Huawei and Snowden questions : Can electronic equipment from untrusted vendors be verified? Can an untrusted vendor build trust into electronic equipment? /: Can electronic equipment from untrusted vendors be verified? Can an untrusted vendor build trust into electronic equipment?. (2018)
Main Title:
The Huawei and Snowden questions : Can electronic equipment from untrusted vendors be verified? Can an untrusted vendor build trust into electronic equipment?
1 Introduction -- 2 Trust.- 3 What is an ICT-System?.- 4 Development of ICT Systems.- 5 Theoretical Foundation.- 6 Reverse Engineering of Code -- 7 Static Detection of Malware.- 8 Dynamic Detection Methods.- 9 Formal Methods.- 10 Software Quality and Quality Management.- 11 Containment of Untrusted Modules.- 12 Summary and Way Forward.
Note: Includes bibliographical references. Note: Online resource; title from PDF title page (SpringerLink, viewed February 28, 2018).
Access Rights:
Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
Access Usage:
Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.