My Account Log in

4 options

Practical embedded security : building secure resource-constrained systems / by Timothy Stapko.

EBSCOhost Academic eBook Collection (North America) Available online

View online

EBSCOhost eBook Community College Collection Available online

View online

Ebook Central Academic Complete Available online

View online

O'Reilly Online Learning: Academic/Public Library Edition Available online

View online
Format:
Book
Author/Creator:
Stapko, Timothy John.
Series:
Embedded technology series.
Embedded technology series
Language:
English
Subjects (All):
Embedded computer systems.
Computer networks--Security measures.
Computer networks.
Computer security.
Physical Description:
1 online resource (299 p.)
Edition:
1st edition
Place of Publication:
Amsterdam ; Boston : Elsevier/Newnes, c2008.
Language Note:
English
System Details:
text file
Summary:
The great strides made over the past decade in the complexity and network functionality of embedded systems have significantly enhanced their attractiveness for use in critical applications such as medical devices and military communications. However, this expansion into critical areas has presented embedded engineers with a serious new problem: their designs are now being targeted by the same malicious attackers whose predations have plagued traditional systems for years. Rising concerns about data security in embedded devices are leading engineers to pay more attention to security assurance
Contents:
Front cover; Practical Embedded Security; Copyright page; Table of contents; Preface; CHAPTER 1: Computer Security Introduction and Review; What Is Security?; What Can We Do?; Access Control and the Origins of Computer Security Theory; Security Policies; Cryptography; Data Integrity and Authentication; Wrap-Up; Recommended Reading; CHAPTER 2: Network Communications Protocols and Built-in Security; Low-Level Communications; Transport and Internet Layer Protocols; Other Network Protocols; Wrap-Up: Network Communications; CHAPTER 3: Security Protocols and Algorithms; Protocol Madness
Standardizing Security-A Brief HistoryStandardized Security in Practice; Cryptography and Protocols; Other Security Protocols; CHAPTER 4: The Secure Sockets Layer; SSL History; Pesky PKI; PKI Alternatives; SSL Under the Hood; The SSL Session; SSL in Practice; Wrap-Up; CHAPTER 5: Embedded Security; Networked Embedded Systems and Resource Constraints; Embedded Security Design; The KISS Principle; Modularity Is Key; Pick and Pull; Justification; Wrap-Up; CHAPTER 6: Wireless; Wireless Technologies; Bluetooth; ZigBee; Wireless Technologies and the Future; Wrap-Up
CHAPTER 7: Application-Layer and Client/Server ProtocolsIntroduction; The World Wide Web; Web-Based Interfaces; Server-Side HTTP Web Interfaces; HTTP Client Web Interfaces; Combination Client/Server HTTP Applications; Console Applications; File Transfer Protocol; Email, DNS, DHCP, and SNMP; Wrap-Up; CHAPTER 8: Choosing and Optimizing Cryptographic Algorithms for Resource-Constrained Systems; Do We Need Cryptography?; Hashing-Low Security, High Performance; To Optimize or Not to Optimize · · ·; Choosing Cryptographic Algorithms; Tailoring Security for Your Application; Wrap-Up
CHAPTER 9: Hardware-Based SecurityHigh Performance in Silicon; Wrap-Up: Security and Hardware; CHAPTER 10: Conclusion-Miscellaneous Security Issues and the Future of Embedded Applications Security; Programming Languages and Security; Dealing with Attacks; The Future of Security; Wrap-Up; CHAPTER 11: PIC Case Study; Microchip PIC with Ethernet Controller; PIC Example Application-Secure LED Blinking; CHAPTER 12: Rabbit Case Study; Rabbit 4000 CPU with Dynamic C; The History of Rabbit; Software on the Rabbit; Rabbit Case Study-Internet Enabled Vending Machine; Putting It All Together
The PC SideWrap-Up: A Secure Rabbit; APPENDIX A: Source Listings; PIC Example Source Code (Main Program); Index
Notes:
Description based upon print version of record.
Includes bibliographical references and index.
ISBN:
9786611039318
9781281039316
1281039314
9780080551319
0080551319
OCLC:
437189387

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account