4 options
Practical embedded security : building secure resource-constrained systems / by Timothy Stapko.
- Format:
- Book
- Author/Creator:
- Stapko, Timothy John.
- Series:
- Embedded technology series.
- Embedded technology series
- Language:
- English
- Subjects (All):
- Embedded computer systems.
- Computer networks--Security measures.
- Computer networks.
- Computer security.
- Physical Description:
- 1 online resource (299 p.)
- Edition:
- 1st edition
- Place of Publication:
- Amsterdam ; Boston : Elsevier/Newnes, c2008.
- Language Note:
- English
- System Details:
- text file
- Summary:
- The great strides made over the past decade in the complexity and network functionality of embedded systems have significantly enhanced their attractiveness for use in critical applications such as medical devices and military communications. However, this expansion into critical areas has presented embedded engineers with a serious new problem: their designs are now being targeted by the same malicious attackers whose predations have plagued traditional systems for years. Rising concerns about data security in embedded devices are leading engineers to pay more attention to security assurance
- Contents:
- Front cover; Practical Embedded Security; Copyright page; Table of contents; Preface; CHAPTER 1: Computer Security Introduction and Review; What Is Security?; What Can We Do?; Access Control and the Origins of Computer Security Theory; Security Policies; Cryptography; Data Integrity and Authentication; Wrap-Up; Recommended Reading; CHAPTER 2: Network Communications Protocols and Built-in Security; Low-Level Communications; Transport and Internet Layer Protocols; Other Network Protocols; Wrap-Up: Network Communications; CHAPTER 3: Security Protocols and Algorithms; Protocol Madness
- Standardizing Security-A Brief HistoryStandardized Security in Practice; Cryptography and Protocols; Other Security Protocols; CHAPTER 4: The Secure Sockets Layer; SSL History; Pesky PKI; PKI Alternatives; SSL Under the Hood; The SSL Session; SSL in Practice; Wrap-Up; CHAPTER 5: Embedded Security; Networked Embedded Systems and Resource Constraints; Embedded Security Design; The KISS Principle; Modularity Is Key; Pick and Pull; Justification; Wrap-Up; CHAPTER 6: Wireless; Wireless Technologies; Bluetooth; ZigBee; Wireless Technologies and the Future; Wrap-Up
- CHAPTER 7: Application-Layer and Client/Server ProtocolsIntroduction; The World Wide Web; Web-Based Interfaces; Server-Side HTTP Web Interfaces; HTTP Client Web Interfaces; Combination Client/Server HTTP Applications; Console Applications; File Transfer Protocol; Email, DNS, DHCP, and SNMP; Wrap-Up; CHAPTER 8: Choosing and Optimizing Cryptographic Algorithms for Resource-Constrained Systems; Do We Need Cryptography?; Hashing-Low Security, High Performance; To Optimize or Not to Optimize · · ·; Choosing Cryptographic Algorithms; Tailoring Security for Your Application; Wrap-Up
- CHAPTER 9: Hardware-Based SecurityHigh Performance in Silicon; Wrap-Up: Security and Hardware; CHAPTER 10: Conclusion-Miscellaneous Security Issues and the Future of Embedded Applications Security; Programming Languages and Security; Dealing with Attacks; The Future of Security; Wrap-Up; CHAPTER 11: PIC Case Study; Microchip PIC with Ethernet Controller; PIC Example Application-Secure LED Blinking; CHAPTER 12: Rabbit Case Study; Rabbit 4000 CPU with Dynamic C; The History of Rabbit; Software on the Rabbit; Rabbit Case Study-Internet Enabled Vending Machine; Putting It All Together
- The PC SideWrap-Up: A Secure Rabbit; APPENDIX A: Source Listings; PIC Example Source Code (Main Program); Index
- Notes:
- Description based upon print version of record.
- Includes bibliographical references and index.
- ISBN:
- 9786611039318
- 9781281039316
- 1281039314
- 9780080551319
- 0080551319
- OCLC:
- 437189387
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.