Navigation überspringen
Universitätsbibliothek Heidelberg
Standort: ---
Exemplare: ---
 Online-Ressource
Verfasst von:Merli, Dominik [VerfasserIn]   i
Titel:Engineering secure devices
Titelzusatz:a practical guide for embedded system architechts and developers
Verf.angabe:by Dominik Merli
Ausgabe:[First edition].
Verlagsort:San Francisco, CA
Verlag:No Starch Press, Inc.
E-Jahr:2024
Jahr:[2024]
Umfang:1 online resource (288 pages)
Illustrationen:illustrations
Fussnoten:Includes index
ISBN:1-7185-0349-0
 978-1-7185-0349-6
Abstract:As an engineer, you know that countless devices—from industrial components to smart household appliances—rely on embedded computer systems. But how do you balance the need for robust security with performance and innovative product design? Engineering Secure Devices will guide you through crafting secure devices—from protecting crucial assets to the nature of attackers and the risks they pose. You’ll explore the technical intricacies and pros and cons of symmetric and asymmetric cryptography and learn how to use and analyze random number generators and cryptographic algorithms. You’ll learn how to ensure confidential data storage and secure memory, and devise secure device identity solutions and communication protocols to reinforce system architecture against potential threats. And finally, you’ll learn how to properly design secure boot and secure update processes, manage access control, and perform system monitoring to secure IoT devices. Real-world case studies throughout highlight practical applications, solutions, and obstacles, such as firmware updates with SWUpdate, secure communication with MQTT, and advanced access control with AppArmor. Whether you’re an IoT developer or an embedded system architect, Engineering Secure Devices equips you with the indispensable knowledge to design, secure, and support the next generation of smart devices—from webcams to four-legged robots.
 "A practical guide to designing secure embedded computer systems. Covers key embedded security components like random number generators, cryptographic algorithms, and secure data storage. Later chapters explore advanced concepts such as secure boot and firmware updates, access control, and system monitoring. Features case studies and implementation examples throughout"-- Provided by publisher
URL:Aggregator: https://learning.oreilly.com/library/view/-/9781098182205/?ar
Datenträger:Online-Ressource
Sprache:eng
Bibliogr. Hinweis:Erscheint auch als : Druck-Ausgabe
Sach-SW:Sécurité informatique
K10plus-PPN:1892760770
 
 
Lokale URL UB: Zum Volltext
 
 Bibliothek der Medizinischen Fakultät Mannheim der Universität Heidelberg
 Klinikum MA Bestellen/Vormerken für Benutzer des Klinikums Mannheim
Eigene Kennung erforderlich
Bibliothek/Idn:UW / m4544446988
Lokale URL Inst.: Zum Volltext

Permanenter Link auf diesen Titel (bookmarkfähig):  https://katalog.ub.uni-heidelberg.de/titel/69228100   QR-Code
zum Seitenanfang