|
|
|
|
LEADER |
00000cam a2200000Ma 4500 |
001 |
SCIDIR_ocn787847109 |
003 |
OCoLC |
005 |
20231117044716.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
120123s2012 ne a ob 001 0 eng d |
010 |
|
|
|z 2012931463
|
040 |
|
|
|a E7B
|b eng
|e pn
|c E7B
|d OCLCQ
|d YDXCP
|d EBLCP
|d MHW
|d MYG
|d OPELS
|d MERUC
|d CDX
|d N$T
|d OCLCQ
|d DEBSZ
|d OCLCQ
|d TEFOD
|d OCLCF
|d OCLCQ
|d CNSPO
|d OCLCQ
|d TEFOD
|d OCLCQ
|d Z5A
|d OCLCA
|d OCLCQ
|d WYU
|d LEAUB
|d OL$
|d VT2
|d OCLCQ
|d TUHNV
|d OCLCO
|d OCLCQ
|d OCLCO
|
016 |
7 |
|
|a 016052969
|2 Uk
|
019 |
|
|
|a 872684906
|a 1065807777
|a 1103267044
|a 1129363682
|a 1152972039
|a 1192335106
|a 1202541708
|a 1235845223
|a 1240511091
|a 1243582774
|a 1262670980
|
020 |
|
|
|a 9780123868879
|q (electronic bk.)
|
020 |
|
|
|a 0123868874
|q (electronic bk.)
|
020 |
|
|
|a 9780123868862
|q (electronic bk.)
|
020 |
|
|
|a 0123868866
|q (electronic bk.)
|
035 |
|
|
|a (OCoLC)787847109
|z (OCoLC)872684906
|z (OCoLC)1065807777
|z (OCoLC)1103267044
|z (OCoLC)1129363682
|z (OCoLC)1152972039
|z (OCoLC)1192335106
|z (OCoLC)1202541708
|z (OCoLC)1235845223
|z (OCoLC)1240511091
|z (OCoLC)1243582774
|z (OCoLC)1262670980
|
050 |
|
4 |
|a QA76.76.D47
|b K54 2012eb
|
072 |
|
7 |
|a COM
|x 051430
|2 bisacsh
|
082 |
0 |
4 |
|a 005.10685
|
100 |
1 |
|
|a Kleidermacher, David.
|
245 |
1 |
0 |
|a Embedded systems security :
|b practical methods for safe and secure software and systems development /
|c David Kleidermacher, Mike Kleidermacher.
|
250 |
|
|
|a 1st ed.
|
260 |
|
|
|a Amsterdam :
|b Elsevier,
|c 2012.
|
300 |
|
|
|a 1 online resource (xx, 396 pages) :
|b color illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
520 |
|
|
|a The ultimate resource for making embedded systems reliable, safe, and secure Embedded Systems Security provides: A broad understanding of security principles, concerns, and technologies Proven techniques for the efficient development of safe and secure embedded software. A study of the system architectures, operating systems and hypervisors, networking, storage, and cryptographic issues that must be considered when designing secure embedded systems. Nuggets of practical advice and numerous case studies throughout.
|
505 |
0 |
|
|a Chapter 1. Introduction to Embedded Systems Security -- Chapter 2. Systems Software Considerations -- Chapter 3. Secure Embedded Software Development -- Chapter 4. Embedded Cryptography -- Chapter 5. Data Protection Protocols for Embedded Systems -- Chapter 6. Emerging Applications.
|
650 |
|
0 |
|a Computer software
|x Development.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
6 |
|a S�ecurit�e informatique.
|0 (CaQQLa)201-0061152
|
650 |
|
7 |
|a COMPUTERS
|x Software Development & Engineering
|x Project Management.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Computer software
|x Development
|2 fast
|0 (OCoLC)fst00872537
|
700 |
1 |
|
|a Kleidermacher, Mike.
|
776 |
0 |
8 |
|i Print version:
|a Kleidermacher, David.
|t Embedded systems security.
|b 1st ed.
|d Amsterdam : Elsevier, 2012
|w (DLC) 2012931463
|
856 |
4 |
0 |
|u https://sciencedirect.uam.elogim.com/science/book/9780123868862
|z Texto completo
|