Secure Smart Embedded Devices, Platforms and Applications (eBook)

eBook Download: PDF
2013 | 2014
XLI, 568 Seiten
Springer New York (Verlag)
978-1-4614-7915-4 (ISBN)

Lese- und Medienproben

Secure Smart Embedded Devices, Platforms and Applications -
Systemvoraussetzungen
234,33 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

New generations of IT users are increasingly abstracted from the underlying devices and platforms that provide and safeguard their services. As a result they may have little awareness that they are critically dependent on the embedded security devices that are becoming pervasive in daily modern life. Secure Smart Embedded Devices, Platforms and Applications provides a broad overview of the many security and practical issues of embedded devices, tokens, and their operation systems, platforms and main applications. It also addresses a diverse range of industry/government initiatives and considerations, while focusing strongly on technical and practical security issues.

The benefits and pitfalls of developing and deploying applications that rely on embedded systems and their security functionality are presented. A sufficient level of technical detail to support embedded systems is provided throughout the text, although the book is quite readable for those seeking awareness through an initial overview of the topics. This edited volume benefits from the contributions of industry and academic experts and helps provide a cross-discipline overview of the security and practical issues for embedded systems, tokens, and platforms. It is an ideal complement to the earlier work, Smart Cards Tokens, Security and Applications from the same editors.


New generations of IT users are increasingly abstracted from the underlying devices and platforms that provide and safeguard their services. As a result they may have little awareness that they are critically dependent on the embedded security devices that are becoming pervasive in daily modern life. Secure Smart Embedded Devices, Platforms and Applications provides a broad overview of the many security and practical issues of embedded devices, tokens, and their operation systems, platforms and main applications. It also addresses a diverse range of industry/government initiatives and considerations, while focusing strongly on technical and practical security issues. The benefits and pitfalls of developing and deploying applications that rely on embedded systems and their security functionality are presented. A sufficient level of technical detail to support embedded systems is provided throughout the text, although the book is quite readable for those seeking awareness through an initial overview of the topics. This edited volume benefits from the contributions of industry and academic experts and helps provide a cross-discipline overview of the security and practical issues for embedded systems, tokens, and platforms. It is an ideal complement to the earlier work, Smart Cards Tokens, Security and Applications from the same editors.

An Introduction to Smart Cards and RFIDs.- Embedded DSP Devices.- Microprocessors & Microcontrollers Security.- An Introduction to the Trusted Platform Module and Mobile Trusted Module.- Hardware and VLSI Designs.- Information Security Best Practices.- Smart Card Security.- Graphics Processing Units.- A Survey of Recent Results in FPGA Security and Intellectual Property Protection.- Mobile Communication Security Controllers.- Security of Embedded Location Systems.- Automotive Embedded Systems.- Analysis of Potential Vulnerabilities in Payment Terminals.- Wireless Sensor Nodes.- Near Field Communication.- The BIOS and Rootkits.- Hardware Security Modules.- Security Evaluation and Common Criteria.- Physical Security Primitives.- SCADA System Cyber Security.- An Overview of PIC Microcontrollers and their Suitability for Cryptographic Algorithms.- An Introduction to Java Card Programming.- A Practical Example of Mobile Phone Application using SATSA (JSR 177) API.- Wireless Sensors(Languages/Programming/Developments/Tools/Examples).

Erscheint lt. Verlag 14.9.2013
Zusatzinfo XLI, 568 p. 135 illus.
Verlagsort New York
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Datenbanken
Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Algorithmen
Technik Elektrotechnik / Energietechnik
Technik Nachrichtentechnik
Schlagworte Applications • Attacks • Automotive • cryptography • Embedd • Embedded Systems • GPS • microprocessors • mobile phones • Near field Communications (NFC) • platforms • programming • protocols • Satellite TV set-top-boxes • security • Smart cards • Terminals • wireless sensor nodes
ISBN-10 1-4614-7915-0 / 1461479150
ISBN-13 978-1-4614-7915-4 / 9781461479154
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 10,7 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Umfassendes Sicherheits-, Kontinuitäts- und Risikomanagement mit …

von Klaus-Rainer Müller

eBook Download (2023)
Springer Fachmedien Wiesbaden (Verlag)
79,99
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99