The Huawei and Snowden Questions (Record no. 6118)

MARC details
000 -LEADER
fixed length control field 02885naaaa2200421uu 4500
001 - CONTROL NUMBER
control field https://library.oapen.org/handle/20.500.12657/42904
003 - CONTROL NUMBER IDENTIFIER
control field oapen
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230403134706.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr|mn|---annan
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 20201113s2018 xx |||||o ||| eng|| d
040 ## - CATALOGING SOURCE
Original cataloging agency oapen
Transcribing agency oapen
041 0# - LANGUAGE CODE
Language code of text/sound track or separate title eng
042 ## - AUTHENTICATION CODE
Authentication code dc
080 ## - UNIVERSAL DECIMAL CLASSIFICATION NUMBER
Universal Decimal Classification number 004
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Lysne, Olav
Relationship auth
245 10 - TITLE STATEMENT
Title The Huawei and Snowden Questions
Remainder of title Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Name of publisher, distributor, etc. Springer Nature
Date of publication, distribution, etc. 2018
300 ## - PHYSICAL DESCRIPTION
Extent 1 electronic resource (116 p.)
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
490 1# - SERIES STATEMENT
Series statement Simula SpringerBriefs on Computing
Volume/sequential designation v.4
506 0# - RESTRICTIONS ON ACCESS NOTE
Terms governing access Open Access
Source of term star
Standardized terminology for access restriction Unrestricted online access
520 ## - SUMMARY, ETC.
Summary, etc. This open access book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted vendors? Secondly, can I build trust into my products in such a way that I support verification by untrusting customers? In separate chapters the book takes readers through the state of the art in fields of computer science that can shed light on these questions. In a concluding chapter it discusses realistic ways forward. In discussions on cyber security, there is a tacit assumption that the manufacturer of equipment will collaborate with the user of the equipment to stop third-party wrongdoers. The Snowden files and recent deliberations on the use of Chinese equipment in the critical infrastructures of western countries have changed this. The discourse in both cases revolves around what malevolent manufacturers can do to harm their own customers, and the importance of the matter is on par with questions of national security. This book is of great interest to ICT and security professionals who need a clear understanding of the two questions posed in the subtitle, and to decision-makers in industry, national bodies and nation states.
540 ## - TERMS GOVERNING USE AND REPRODUCTION NOTE
Terms governing use and reproduction Creative Commons
Use and reproduction rights by/4.0/
Source of term cc
546 ## - LANGUAGE NOTE
Language note English
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Криптография, безопасность
9 (RLIN) 2233
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Конфиденциальность и защита данных
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Информационная архитектура
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Компьютерная техника
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Кибербезопасность
830 ## - SERIES ADDED ENTRY--UNIFORM TITLE
9 (RLIN) 4507
Uniform title Simula SpringerBriefs on Computing
Volume/sequential designation v.2
856 40 - ELECTRONIC LOCATION AND ACCESS
Host name www.oapen.org
Uniform Resource Identifier <a href="https://library.oapen.org/bitstream/id/621698d1-c5ef-4160-99e0-5f763d8181f5/2018_Book_TheHuaweiAndSnowdenQuestions.pdf">https://library.oapen.org/bitstream/id/621698d1-c5ef-4160-99e0-5f763d8181f5/2018_Book_TheHuaweiAndSnowdenQuestions.pdf</a>
Access status 0
Public note Download
856 40 - ELECTRONIC LOCATION AND ACCESS
Host name www.oapen.org
Uniform Resource Identifier <a href="https://library.oapen.org/handle/20.500.12657/42904">https://library.oapen.org/handle/20.500.12657/42904</a>
Access status 0
Public note Description
909 ## - Составили записи
-- 4
-- Darya Shvetsova
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Универсальная десятичная классификация
Koha item type Electronic edition
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Serial Enumeration / chronology Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type Public note
    Универсальная десятичная классификация     Computers Bucheon University Library Bucheon University Library OAPEN 24.03.2023 v.4   004 S61 v.4 1010504 24.03.2023 24.03.2023 Electronic edition Смотреть (pdf)