Buch, Englisch, 284 Seiten, Format (B × H): 191 mm x 235 mm
Building Secure Resource-Constrained Systems
Buch, Englisch, 284 Seiten, Format (B × H): 191 mm x 235 mm
ISBN: 978-0-7506-8215-2
Verlag: Elsevier Science & Technology
- The ONLY book dedicated to a comprehensive coverage of embedded security!
- Covers both hardware- and software-based embedded security solutions for preventing and dealing with attacks
- Application case studies support practical explanations of all key topics, including network protocols, wireless and cellular communications, languages (Java and C/++), compilers, web-based interfaces, cryptography, and an entire section on SSL
Zielgruppe
PRIMARY MARKET: Embedded System Developers, Designers, Programmers and Engineers; Software, Firmware and System Developers, Designers, Programmers, and Engineers
SECONDARY MARKET: Engineering Managers, Students in advanced courses on embedded system design topics
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
1: Computer Security Introduction and Review 2: Network Communications Protocols and Built-in Security 3: Security Protocols and Algorithms 4: The Secure Sockets Layer 5: Embedded Security 6: Wireless 7: Application-Layer and Client/Server Protocols 8: Choosing and Optimizing Cryptographic Algorithms for Resource-Constrained Systems 9: Hardware-Based Security 10: Conclusion-Miscellaneous Security Issues and the Future of Embedded Applications Security 11: PIC Case Study 12: Rabbit Case Study