<?xml version="1.0" encoding="UTF-8"?>
<collection xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd" xmlns="http://www.loc.gov/MARC21/slim">
 <record>
  <leader>00000cmm a22000004i 4500</leader>
  <controlfield tag="001">UP-99796217613391826</controlfield>
  <controlfield tag="003">Buklod</controlfield>
  <controlfield tag="005">20200614085824.0</controlfield>
  <controlfield tag="006">m    |o  d |      </controlfield>
  <controlfield tag="007">cr cu|mmmmuaua</controlfield>
  <controlfield tag="008">180419s2018    xx      o  u |      eng d</controlfield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">9783319790817 (online ISBN)</subfield>
  </datafield>
  <datafield tag="035" ind1=" " ind2=" ">
   <subfield code="a">(iLib)UPD-00516570997</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
   <subfield code="a">WaSeSS</subfield>
   <subfield code="d">DENGII</subfield>
   <subfield code="e">rda</subfield>
  </datafield>
  <datafield tag="041" ind1=" " ind2=" ">
   <subfield code="a">eng</subfield>
  </datafield>
  <datafield tag="084" ind1=" " ind2=" ">
   <subfield code="a">TK 7888.4</subfield>
   <subfield code="b">S25 2018eb</subfield>
  </datafield>
  <datafield tag="100" ind1="1" ind2=" ">
   <subfield code="a">Salmani, Hassan</subfield>
   <subfield code="e">author.</subfield>
  </datafield>
  <datafield tag="245" ind1="1" ind2="0">
   <subfield code="a">Trusted digital circuits</subfield>
   <subfield code="b">hardware trojan vulnerabilities, prevention and detection</subfield>
   <subfield code="c">Hassan Salmani.</subfield>
  </datafield>
  <datafield tag="264" ind1=" " ind2="1">
   <subfield code="a">Cham</subfield>
   <subfield code="b">Springer International Publishing</subfield>
   <subfield code="c">[2018]</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
   <subfield code="a">1 online resource.</subfield>
  </datafield>
  <datafield tag="336" ind1=" " ind2=" ">
   <subfield code="a">text</subfield>
   <subfield code="2">rdacontent</subfield>
  </datafield>
  <datafield tag="337" ind1=" " ind2=" ">
   <subfield code="a">computer</subfield>
   <subfield code="2">rdamedia</subfield>
  </datafield>
  <datafield tag="338" ind1=" " ind2=" ">
   <subfield code="a">online resource</subfield>
   <subfield code="2">rdacarrier</subfield>
  </datafield>
  <datafield tag="505" ind1="0" ind2=" ">
   <subfield code="a">The Global Integrated Circuit Supply Chain Flow and the Hardware Trojan Attack -- Circuit Vulnerabilities to Hardware Trojans at the Register Transfer Level -- Design Techniques for Hardware Trojans Prevention and Detection at the Register Transfer Level -- Circuit Vulnerabilities to Hardware Trojans at the Gate Level -- Design Techniques for Hardware Trojans Prevention and Detection at the Gate Level -- Circuit Vulnerabilities to Hardware Trojan at the Layout Level -- Design Techniques for Hardware Trojans Prevention and Detection at the Layout Level -- Trusted Testing Techniques for Hardware Trojan Detection -- Hardware Trojans in Analog and Mixed-Signal Integrated Circuits.</subfield>
  </datafield>
  <datafield tag="506" ind1=" " ind2=" ">
   <subfield code="a">IP-based subscription, on campus and remote access.</subfield>
   <subfield code="c">Access via Electronic Resources of the UPD Engineering Library and University Library websites.</subfield>
  </datafield>
  <datafield tag="533" ind1=" " ind2=" ">
   <subfield code="a">Electronic reproduction.</subfield>
   <subfield code="b">Cham</subfield>
   <subfield code="c">Springer International Publishing</subfield>
   <subfield code="d">2018.</subfield>
   <subfield code="n">Available via World Wide Web through SpringerLink.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Engineering.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Microprocessors.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Computer security.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Electronic circuits.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Electronic books.</subfield>
  </datafield>
  <datafield tag="710" ind1="2" ind2=" ">
   <subfield code="a">SpringerLink (Online service).</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2="0">
   <subfield code="z">Available for University of the Philippines System via SpringerLink. Click here to access</subfield>
   <subfield code="u">https://doi.org/10.1007/978-3-319-79081-7</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2="0">
   <subfield code="z">Also available remotely for University of the Philippines System via SpringerLink. Click here to access thru EZproxy</subfield>
   <subfield code="u">https://link.springer.com.ezproxy.engglib.upd.edu.ph/book/10.1007%2F978-3-319-79081-7</subfield>
  </datafield>
  <datafield tag="856" ind1=" " ind2=" ">
   <subfield code="z">(viewed 14 June 2020)</subfield>
  </datafield>
  <datafield tag="905" ind1=" " ind2=" ">
   <subfield code="a">FO</subfield>
  </datafield>
  <datafield tag="852" ind1="0" ind2=" ">
   <subfield code="a">UPD</subfield>
   <subfield code="b">DENG-II</subfield>
  </datafield>
  <datafield tag="942" ind1=" " ind2=" ">
   <subfield code="a">Electronic Resource</subfield>
  </datafield>
 </record>
</collection>
