Книга Engineering Secure Devices

Формат
Язык книги
Издательство
Год издания

With the rise of the Internet of Things (IoT) and the increased connectivity of smart devices that rely on an embedded computer system at their core, the need for affordable yet effective security measures is higher than ever. This book takes you on a tour through the jungle of potential risks and protection measures, as well as the reasoning behind them, and practical implementation examples. Based on hands-on experience and recent research insights, the journey starts with the basics for a secure development process and summarizes the cryptographic essentials relevant for practical security engineering. Next you'll explore embedded security building blocks like random number generators, implementations options for cryptographic algorithms, secure data storage, unique device identities, and protected communication channels. Later chapters cover advanced device concepts like secure boot and firmware update processes, access control management, and system monitoring. Several case studies throughout will bridge the gap between theory and real-world practices, demonstrating the advantages - or disadvantages - of different implementations.

Код товара
20553747
Характеристики
Тип обложки
Мягкий
Язык
Английский
Доставка и оплата
Указать город доставки Чтобы видеть точные условия доставки
Описание книги

With the rise of the Internet of Things (IoT) and the increased connectivity of smart devices that rely on an embedded computer system at their core, the need for affordable yet effective security measures is higher than ever. This book takes you on a tour through the jungle of potential risks and protection measures, as well as the reasoning behind them, and practical implementation examples. Based on hands-on experience and recent research insights, the journey starts with the basics for a secure development process and summarizes the cryptographic essentials relevant for practical security engineering. Next you'll explore embedded security building blocks like random number generators, implementations options for cryptographic algorithms, secure data storage, unique device identities, and protected communication channels. Later chapters cover advanced device concepts like secure boot and firmware update processes, access control management, and system monitoring. Several case studies throughout will bridge the gap between theory and real-world practices, demonstrating the advantages - or disadvantages - of different implementations.

Отзывы
Возникли вопросы? 0-800-335-425
3693 грн
Доставка c UK 20-30 дней
Бумажная книга
Оплачивайте частями
Чтобы оплатить частями: нужно иметь карты Monobank или ПриватБанка, при оформлении заказа выберите способ оплаты «Покупка частями от Monobank» или «Оплата частями от ПриватБанка».
ПриватБанк
2-4 платежа
Доставка и оплата
Указать город доставки Чтобы видеть точные условия доставки