Cargando…

Security Engineering for Vehicular IT Systems Improving the Trustworthiness and Dependability of Automotive IT Applications /

Even though most vehicular IT systems are indeed developed to face technical failures, they rarely consider a systematic malicious encroachment. However, in the degree that vehicular electronics are becoming software-driven, digitally networked and interactive IT systems, dependable security measure...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Wolf, Marko (Autor)
Autor Corporativo: SpringerLink (Online service)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Wiesbaden : Vieweg+Teubner Verlag : Imprint: Vieweg+Teubner Verlag, 2009.
Edición:1st ed. 2009.
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-3-8348-9581-3
003 DE-He213
005 20220118030935.0
007 cr nn 008mamaa
008 100301s2009 gw | s |||| 0|eng d
020 |a 9783834895813  |9 978-3-8348-9581-3 
024 7 |a 10.1007/978-3-8348-9581-3  |2 doi 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
072 7 |a UTN  |2 thema 
082 0 4 |a 005.8  |2 23 
100 1 |a Wolf, Marko.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Security Engineering for Vehicular IT Systems  |h [electronic resource] :  |b Improving the Trustworthiness and Dependability of Automotive IT Applications /  |c by Marko Wolf. 
250 |a 1st ed. 2009. 
264 1 |a Wiesbaden :  |b Vieweg+Teubner Verlag :  |b Imprint: Vieweg+Teubner Verlag,  |c 2009. 
300 |a XXII, 228 p. 38 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a The Preliminaries -- Related Work -- Brief Background in Security and Cryptography -- The Threats -- Security-Critical Vehicular Applications -- Attackers and Attacks in the Automotive Domain -- Security Analysis and Characteristical Constraints in the Automotive Domain -- The Protection -- Vehicular Security Technologies -- Vehicular Security Mechanisms -- Organizational Security. 
520 |a Even though most vehicular IT systems are indeed developed to face technical failures, they rarely consider a systematic malicious encroachment. However, in the degree that vehicular electronics are becoming software-driven, digitally networked and interactive IT systems, dependable security measures are essential to ensure driving safety and enable the automotive industry to achieve different legal requirements. Marko Wolf provides a comprehensive overview of the emerging area of vehicular security. Having identified potential threats, attacks, and attackers for current and future vehicular IT applications, the author presents practical security measures to meet the identified security requirements efficiently and dependably. The suggested implementations can contribute to ensure driving safety and protect the liability, the revenues, and the expertise of vehicle manufacturers and suppliers. 
650 0 |a Data protection. 
650 0 |a Automotive engineering. 
650 0 |a Computer science. 
650 1 4 |a Data and Information Security. 
650 2 4 |a Automotive Engineering. 
650 2 4 |a Computer Science. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783834807953 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-3-8348-9581-3  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)