This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. Case studies are used to present new techniques designed as industrial security solutions. Coverage includes development of tamper resistant hardware and firmware mechanisms for lightweight embedded devices, as well as those serving as security anchors for embedded platforms required by applications such as smart power grids, smart networked and home appliances, environmental and infrastructure sensor networks, etc.
· Enables readers to address a variety of security threats to embedded hardware and software;
· Describes design of secure wireless sensor networks, to address secure authentication of trusted portable devices for embedded systems;
· Presents secure solutions for the design of smart-grid applications and their deployment in large-scale networked and systems.
"synopsis" may belong to another edition of this title.
This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. Case studies are used to present new techniques designed as industrial security solutions. Coverage includes development of tamper resistant hardware and firmware mechanisms for lightweight embedded devices, as well as those serving as security anchors for embedded platforms required by applications such as smart power grids, smart networked and home appliances, environmental and infrastructure sensor networks, etc.
· Enables readers to address a variety of security threats to embedded hardware and software;
· Describes design of secure wireless sensor networks, to address secure authentication of trusted portable devices for embedded systems;
· Presents secure solutions for the design of smart-grid applications and their deployment in large-scale networked and systems.
"About this title" may belong to another edition of this title.
US$ 35.16 shipping from Germany to U.S.A.
Destination, rates & speedsSeller: Universitätsbuchhandlung Herta Hold GmbH, Berlin, Germany
Aufl. 2014. XXVI, 299 p. Hardcover. Versand aus Deutschland / We dispatch from Germany via Air Mail. Einband bestoßen, daher Mängelexemplar gestempelt, sonst sehr guter Zustand. Imperfect copy due to slightly bumped cover, apart from this in very good condition. Stamped. Stamped. Sprache: Englisch. Seller Inventory # 6676JB
Quantity: 3 available
Seller: Antiquariat Bookfarm, Löbnitz, Germany
2015. 299 Seiten Buch in neuwertigem Zustand. Wirkt unbenutzt. Lediglich Mini-BibSignatur auf Buchrücken und Barcode auf Vorsatz. 9783319094199 Sprache: Englisch Gewicht in Gramm: 612 Gebundene Ausgabe, Größe: 15.6 x 1.9 x 23.4 cm. Seller Inventory # 1129670
Quantity: 1 available
Seller: Buchpark, Trebbin, Germany
Condition: Sehr gut. Zustand: Sehr gut | Seiten: 328 | Sprache: Englisch | Produktart: Sonstiges. Seller Inventory # 24847915/12
Quantity: 1 available
Seller: Lucky's Textbooks, Dallas, TX, U.S.A.
Condition: New. Seller Inventory # ABLIING23Mar3113020088045
Quantity: Over 20 available
Seller: Books Puddle, New York, NY, U.S.A.
Condition: New. pp. xxvi + 299. Seller Inventory # 26371875553
Quantity: 1 available
Seller: California Books, Miami, FL, U.S.A.
Condition: New. Seller Inventory # I-9783319094199
Quantity: Over 20 available
Seller: Majestic Books, Hounslow, United Kingdom
Condition: New. pp. xxvi + 299 151 Illus. (102 Col.). Seller Inventory # 375251262
Quantity: 1 available
Seller: Ria Christie Collections, Uxbridge, United Kingdom
Condition: New. In. Seller Inventory # ria9783319094199_new
Quantity: Over 20 available
Seller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany
Buch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. Case studies are used to present new techniques designed as industrial security solutions. Coverage includes development of tamper resistant hardware and firmware mechanisms for lightweight embedded devices, as well as those serving as security anchors for embedded platforms required by applications such as smart power grids, smart networked and home appliances, environmental and infrastructure sensor networks, etc. Enables readers to address a variety of security threats to embedded hardware and software; Describes design of secure wireless sensor networks, to address secure authentication of trusted portable devices for embedded systems; Presents secure solutions for the design of smart-grid applications and their deployment in large-scale networked and systems. 328 pp. Englisch. Seller Inventory # 9783319094199
Quantity: 2 available
Seller: Biblios, Frankfurt am main, HESSE, Germany
Condition: New. pp. xxvi + 299. Seller Inventory # 18371875563
Quantity: 1 available