top of page
The Huawei and Snowden Questions: Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?
Inside this Book
!
Widget Didn’t Load
Check your internet and refresh this page.
If that doesn’t work, contact us.

If you make use of this material, you may credit the authors as follows:

Lysne Olav, "The Huawei and Snowden Questions: Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?", Springer Nature, 2018, DOI: 10.1007/978-3-319-74950-1, License: https://creativecommons.org/licenses/by/4.0/

cyber security; IT management; computer science; computer engineering; digital vulnerability

Keywords

Cyber Security, It Management, Computer Science, Computer Engineering, Digital Vulnerability

Rights | License

Except where otherwise noted, this item has been published under the following license:

You might also be interested in the following books from Amazon:

Takedown policy:

If you believe that this publication infringes copyright, please contact us at info@jecasa-ltd.com and provide relevant details so that we can investigate your claim.

!
Widget Didn’t Load
Check your internet and refresh this page.
If that doesn’t work, contact us.
!
Widget Didn’t Load
Check your internet and refresh this page.
If that doesn’t work, contact us.
!
Widget Didn’t Load
Check your internet and refresh this page.
If that doesn’t work, contact us.
bottom of page