Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Amsterdam ; : Elsevier/Newnes,
    UID:
    almahu_9948025675802882
    Format: 1 online resource (299 p.)
    Edition: 1st edition
    ISBN: 1-281-03931-4 , 9786611039318 , 0-08-055131-9
    Series Statement: Embedded technology series
    Content: The great strides made over the past decade in the complexity and network functionality of embedded systems have significantly enhanced their attractiveness for use in critical applications such as medical devices and military communications. However, this expansion into critical areas has presented embedded engineers with a serious new problem: their designs are now being targeted by the same malicious attackers whose predations have plagued traditional systems for years. Rising concerns about data security in embedded devices are leading engineers to pay more attention to security assurance
    Note: Description based upon print version of record. , Front cover; Practical Embedded Security; Copyright page; Table of contents; Preface; CHAPTER 1: Computer Security Introduction and Review; What Is Security?; What Can We Do?; Access Control and the Origins of Computer Security Theory; Security Policies; Cryptography; Data Integrity and Authentication; Wrap-Up; Recommended Reading; CHAPTER 2: Network Communications Protocols and Built-in Security; Low-Level Communications; Transport and Internet Layer Protocols; Other Network Protocols; Wrap-Up: Network Communications; CHAPTER 3: Security Protocols and Algorithms; Protocol Madness , Standardizing Security-A Brief HistoryStandardized Security in Practice; Cryptography and Protocols; Other Security Protocols; CHAPTER 4: The Secure Sockets Layer; SSL History; Pesky PKI; PKI Alternatives; SSL Under the Hood; The SSL Session; SSL in Practice; Wrap-Up; CHAPTER 5: Embedded Security; Networked Embedded Systems and Resource Constraints; Embedded Security Design; The KISS Principle; Modularity Is Key; Pick and Pull; Justification; Wrap-Up; CHAPTER 6: Wireless; Wireless Technologies; Bluetooth; ZigBee; Wireless Technologies and the Future; Wrap-Up , CHAPTER 7: Application-Layer and Client/Server ProtocolsIntroduction; The World Wide Web; Web-Based Interfaces; Server-Side HTTP Web Interfaces; HTTP Client Web Interfaces; Combination Client/Server HTTP Applications; Console Applications; File Transfer Protocol; Email, DNS, DHCP, and SNMP; Wrap-Up; CHAPTER 8: Choosing and Optimizing Cryptographic Algorithms for Resource-Constrained Systems; Do We Need Cryptography?; Hashing-Low Security, High Performance; To Optimize or Not to Optimize · · ·; Choosing Cryptographic Algorithms; Tailoring Security for Your Application; Wrap-Up , CHAPTER 9: Hardware-Based SecurityHigh Performance in Silicon; Wrap-Up: Security and Hardware; CHAPTER 10: Conclusion-Miscellaneous Security Issues and the Future of Embedded Applications Security; Programming Languages and Security; Dealing with Attacks; The Future of Security; Wrap-Up; CHAPTER 11: PIC Case Study; Microchip PIC with Ethernet Controller; PIC Example Application-Secure LED Blinking; CHAPTER 12: Rabbit Case Study; Rabbit 4000 CPU with Dynamic C; The History of Rabbit; Software on the Rabbit; Rabbit Case Study-Internet Enabled Vending Machine; Putting It All Together , The PC SideWrap-Up: A Secure Rabbit; APPENDIX A: Source Listings; PIC Example Source Code (Main Program); Index , English
    Additional Edition: ISBN 0-7506-8215-9
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages