Practical embedded security building secure resource-constrained systems /

The great strides made over the last decade in the complexity and network functionality of embedded systems have significantly enhanced their attractiveness for use in critical applications such as medical devices and military communications. However, this expansion into critical areas has presented...

Full description

Main Author: Stapko, Timothy John.
Other Authors: ScienceDirect (Online service)
Format: eBook
Language: English
Published: Amsterdam ; Boston : Elsevier/Newnes, [2008]
Physical Description: 1 online resource (xvii, 280 pages) : illustrations.
Series: Embedded technology series.
Subjects:
Table of Contents:
  • Maxfield, Design Warriors Guide to FPGAs
  • 0-7506-7604-3, 542 pgs., Paperback, Newnes, 49.95 US/ 29.99 UK/ 44.95 EUR
  • Harrington, Network Security
  • 0-12-311633-3, 384 pgs., Paperback, Morgan Kaufmann, 44.95 US/ 29.99 UK/ 44.95 EUR
  • Ellis, The Internet Security Guidebook
  • 0-12-237471-1, 320 pgs., Paperback, Academic Press, 50.95 US/ 31.99 UK/ 47.95 EUR.
  • Computer security introduction and review
  • Network communications protocols and built-in security
  • Security protocols and algorithms
  • The secure sockets layer
  • Embedded security
  • Wireless
  • Application-layer and client/server protocols
  • Choosing and optimizing cryptographic algorithms for resource-constrained systems
  • Hardware-based security
  • Conclusion
  • miscellaneous security issues and the future of embedded applications security
  • PIC case study
  • Rabbit case study.