The Devil in the Chips-Hardware Failures
(eVideo)
Contributors
Published
[San Francisco, California, USA] : Kanopy Streaming, 2015.
Physical Desc
1 online resource (streaming video file)
Status
Description
Loading Description...
Also in this Series
Checking series information...
More Details
Format
eVideo
Language
und
Notes
General Note
Title from title frames.
General Note
In Process Record.
Participants/Performers
Features: Paul Rosenzweig The University of Chicago Law School
Date/Time and Place of Event
Originally produced by The Teaching Company/The Great Courses in 2013.
Description
Hardware-based threats are one of the most vexing problems in the entire cybersecurity domain. How do we know that our machines will actually do what we tell them to do? Why is compromised hardware such a critical threat to cybersecurity? What are some possible solutions for dangers hidden in computer chips?
System Details
Mode of access: World Wide Web.
Citations
APA Citation, 7th Edition (style guide)
(2015). The Devil in the Chips-Hardware Failures . Kanopy Streaming.
Chicago / Turabian - Author Date Citation, 17th Edition (style guide)2015. The Devil in the Chips-Hardware Failures. Kanopy Streaming.
Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)The Devil in the Chips-Hardware Failures Kanopy Streaming, 2015.
MLA Citation, 9th Edition (style guide)The Devil in the Chips-Hardware Failures Kanopy Streaming, 2015.
Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.
Staff View
Grouped Work ID
72746125-1f31-813e-f6ba-a9c33027c559-und
Grouping Information
Grouped Work ID | 72746125-1f31-813e-f6ba-a9c33027c559-und |
---|---|
Full title | devil in the chips hardware failures |
Author | kanopy |
Grouping Category | movie |
Last Update | 2023-09-27 09:56:57AM |
Last Indexed | 2024-03-27 02:17:17AM |
Book Cover Information
Image Source | sideload |
---|---|
First Loaded | Jan 18, 2024 |
Last Used | Mar 15, 2024 |
Marc Record
First Detected | Sep 08, 2015 12:00:00 AM |
---|---|
Last File Modification Time | Sep 27, 2023 09:57:24 AM |
MARC Record
LEADER | 01552ngm a2200349za 4500 | ||
---|---|---|---|
001 | kan1148534 | ||
003 | CaSfKAN | ||
006 | m o c | ||
007 | vz uzazuu | ||
007 | cr una---unuuu | ||
008 | 150908p20152013cau031 o vlund d | ||
028 | 5 | 2 | |a 1148534|b Kanopy |
035 | |a (OCoLC)921958876 | ||
040 | |a VDU|b eng|c VDU | ||
245 | 0 | 4 | |a The Devil in the Chips-Hardware Failures |
264 | 1 | |a [San Francisco, California, USA] :|b Kanopy Streaming,|c 2015. | |
300 | |a 1 online resource (streaming video file) | ||
306 | |a Duration: 31 minutes | ||
336 | |a two-dimensional moving image|b tdi|2 rdacontent | ||
337 | |a computer|2 rdamedia | ||
338 | |a online resource|b cr|2 rdacarrier | ||
500 | |a Title from title frames. | ||
500 | |a In Process Record. | ||
511 | 0 | |a Features: Paul Rosenzweig The University of Chicago Law School | |
518 | |a Originally produced by The Teaching Company/The Great Courses in 2013. | ||
520 | |a Hardware-based threats are one of the most vexing problems in the entire cybersecurity domain. How do we know that our machines will actually do what we tell them to do? Why is compromised hardware such a critical threat to cybersecurity? What are some possible solutions for dangers hidden in computer chips? | ||
538 | |a Mode of access: World Wide Web. | ||
653 | |a Computer Science and IT | ||
653 | |a Health and Safety | ||
710 | 2 | |a Kanopy (Firm) | |
856 | 4 | 0 | |u https://arcadiaca.kanopy.com/node/148535|z A Kanopy streaming video |
856 | 4 | 2 | |z Cover Image|u https://www.kanopy.com/node/148535/external-image |