Practical embedded security building secure resource-constrained systems

The great strides made over the past decade in the complexity and network functionality of embedded systems have significantly enhanced their attractiveness for use in critical applications such as medical devices and military communications. However, this expansion into critical areas has presented...

Full description

Bibliographic Details
Main Author: Stapko, Timothy John (-)
Format: eBook
Language:Inglés
Published: Amsterdam ; Boston : Elsevier/Newnes c2008.
Edition:1st edition
Series:Embedded technology series.
Subjects:
See on Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627209906719
Description
Summary:The great strides made over the past decade in the complexity and network functionality of embedded systems have significantly enhanced their attractiveness for use in critical applications such as medical devices and military communications. However, this expansion into critical areas has presented embedded engineers with a serious new problem: their designs are now being targeted by the same malicious attackers whose predations have plagued traditional systems for years. Rising concerns about data security in embedded devices are leading engineers to pay more attention to security assurance
Item Description:Description based upon print version of record.
Physical Description:1 online resource (299 p.)
Bibliography:Includes bibliographical references and index.
ISBN:9781281039316
9786611039318
9780080551319