PreliminaryThis book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted vendors? Secondly, can I build trust into my products in such a way that I support verification by untrusting customers? In separate chapters the book takes readers through the state of the art in fields of computer science that can shed light on these questions. In a concluding chapter it discusses realistic ways forward. In discussions on cyber security, there is a tacit assumption that the manufacturer of equipment will collaborate with the user of the equipment to stop third-party wrongdoers. The Snowden files and recent deliberations on the use of Chinese equipment in the critical infrastructures of western countries have changed this. The discourse in both cases revolves around what malevolent manufacturers can do to harm their own customers, and the importance of the matter is on par with questions of national security.This book is of great interest to ICT and security professionals who need a clear understanding of the two questions posed in the subtitle, and to decision-makers in industry, national bodies and nation states.
This open book is licensed under a Creative Commons License (CC BY). You can download The Huawei and Snowden Questions ebook for free in PDF format (2.5 MB).
This is the first book-length exploration of the thoughts and experiences expressed by dementia patients in published narratives over the last thirty years. It contrasts third-person caregiver and first-person patient accounts from different languages and a range of media, focusing on the poetical and political questions these narratives raise: wha...
Quoting is all around us. But do we really know what it means? How do people actually quote today, and how did our present systems come about? This book brings together a down-to-earth account of contemporary quoting with an examination of the comparative and historical background that lies behind it and the characteristic way that quoting links pa...
Macroeconomics: Theory, Markets, and Policy by D. Curtis and I. Irvine provides complete, concise coverage of introductory macroeconomics theory and policy.
The textbook observes short-run macroeconomic performance, analysis, and policy motivated by the recessions of the early 1980s and 1990s, the financial crisis and recession of 2008-2009, and...
The LNCS 11427 and 11428 proceedings set constitutes the proceedings of the 25th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2019, which took place in Prague, Czech Republic, in April 2019, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019.
This book investigates the nature of aesthetic experience and aesthetic objects. Written by leading philosophers, psychologists, literary scholars and semioticians, the book addresses two intertwined issues. The first is related to the phenomenology of aesthetic experience: The understanding of how human beings respond to artworks, how we process l...
This open access volume provides evidence-based knowledge on European solidarity and citizen responses in times of crisis. Does the crisis of European integration translate into a crisis of European solidarity, and if yes, what are the manifestations at the level of individual citizens? How strongly is solidarity rooted at the individual level, bot...