Loading…

Practical embedded security : building secure resource-constrained systems /

The great strides made over the last decade in the complexity and network functionality of embedded systems have significantly enhanced their attractiveness for use in critical applications such as medical devices and military communications. However, this expansion into critical areas has presented...

Full description

Bibliographic Details
Call Number:Libro Electrónico
Main Author: Stapko, Timothy John
Format: Electronic eBook
Language:Inglés
Published: Amsterdam ; Boston : Elsevier/Newnes, ©2008.
Series:Embedded technology series.
Subjects:
Online Access:Texto completo (Requiere registro previo con correo institucional)
Table of Contents:
  • Maxfield, Design Warriors Guide to FPGAs
  • 0-7506-7604-3, 542 pgs., Paperback, Newnes, 49.95 US/ 29.99 UK/ 44.95 EUR
  • Harrington, Network Security
  • 0-12-311633-3, 384 pgs., Paperback, Morgan Kaufmann, 44.95 US/ 29.99 UK/ 44.95 EUR
  • Ellis, The Internet Security Guidebook
  • 0-12-237471-1, 320 pgs., Paperback, Academic Press, 50.95 US/ 31.99 UK/ 47.95 EUR.
  • Computer security introduction and review
  • Network communications protocols and built-in security
  • Security protocols and algorithms
  • The secure sockets layer
  • Embedded security
  • Wireless
  • Application-layer and client/server protocols
  • Choosing and optimizing cryptographic algorithms for resource-constrained systems
  • Hardware-based security
  • Conclusion
  • miscellaneous security issues and the future of embedded applications security
  • PIC case study
  • Rabbit case study.