Practical embedded security : building secure resource-constrained systems /
The great strides made over the last decade in the complexity and network functionality of embedded systems have significantly enhanced their attractiveness for use in critical applications such as medical devices and military communications. However, this expansion into critical areas has presented...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Amsterdam ; Boston :
Elsevier/Newnes,
©2008.
|
Colección: | Embedded technology series.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Maxfield, Design Warriors Guide to FPGAs
- 0-7506-7604-3, 542 pgs., Paperback, Newnes, 49.95 US/ 29.99 UK/ 44.95 EUR
- Harrington, Network Security
- 0-12-311633-3, 384 pgs., Paperback, Morgan Kaufmann, 44.95 US/ 29.99 UK/ 44.95 EUR
- Ellis, The Internet Security Guidebook
- 0-12-237471-1, 320 pgs., Paperback, Academic Press, 50.95 US/ 31.99 UK/ 47.95 EUR.
- Computer security introduction and review
- Network communications protocols and built-in security
- Security protocols and algorithms
- The secure sockets layer
- Embedded security
- Wireless
- Application-layer and client/server protocols
- Choosing and optimizing cryptographic algorithms for resource-constrained systems
- Hardware-based security
- Conclusion
- miscellaneous security issues and the future of embedded applications security
- PIC case study
- Rabbit case study.