Practical embedded security building secure resource-constrained systems

The great strides made over the past decade in the complexity and network functionality of embedded systems have significantly enhanced their attractiveness for use in critical applications such as medical devices and military communications. However, this expansion into critical areas has presented...

Descripción completa

Detalles Bibliográficos
Autor principal: Stapko, Timothy John (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Amsterdam ; Boston : Elsevier/Newnes c2008.
Edición:1st edition
Colección:Embedded technology series.
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627209906719
Descripción
Sumario:The great strides made over the past decade in the complexity and network functionality of embedded systems have significantly enhanced their attractiveness for use in critical applications such as medical devices and military communications. However, this expansion into critical areas has presented embedded engineers with a serious new problem: their designs are now being targeted by the same malicious attackers whose predations have plagued traditional systems for years. Rising concerns about data security in embedded devices are leading engineers to pay more attention to security assurance
Notas:Description based upon print version of record.
Descripción Física:1 online resource (299 p.)
Bibliografía:Includes bibliographical references and index.
ISBN:9781281039316
9786611039318
9780080551319