Secure Smart Embedded Devices, Platforms and Applications (eBook)
XLI, 568 Seiten
Springer New York (Verlag)
978-1-4614-7915-4 (ISBN)
New generations of IT users are increasingly abstracted from the underlying devices and platforms that provide and safeguard their services. As a result they may have little awareness that they are critically dependent on the embedded security devices that are becoming pervasive in daily modern life. Secure Smart Embedded Devices, Platforms and Applications provides a broad overview of the many security and practical issues of embedded devices, tokens, and their operation systems, platforms and main applications. It also addresses a diverse range of industry/government initiatives and considerations, while focusing strongly on technical and practical security issues.
The benefits and pitfalls of developing and deploying applications that rely on embedded systems and their security functionality are presented. A sufficient level of technical detail to support embedded systems is provided throughout the text, although the book is quite readable for those seeking awareness through an initial overview of the topics. This edited volume benefits from the contributions of industry and academic experts and helps provide a cross-discipline overview of the security and practical issues for embedded systems, tokens, and platforms. It is an ideal complement to the earlier work, Smart Cards Tokens, Security and Applications from the same editors.
New generations of IT users are increasingly abstracted from the underlying devices and platforms that provide and safeguard their services. As a result they may have little awareness that they are critically dependent on the embedded security devices that are becoming pervasive in daily modern life. Secure Smart Embedded Devices, Platforms and Applications provides a broad overview of the many security and practical issues of embedded devices, tokens, and their operation systems, platforms and main applications. It also addresses a diverse range of industry/government initiatives and considerations, while focusing strongly on technical and practical security issues. The benefits and pitfalls of developing and deploying applications that rely on embedded systems and their security functionality are presented. A sufficient level of technical detail to support embedded systems is provided throughout the text, although the book is quite readable for those seeking awareness through an initial overview of the topics. This edited volume benefits from the contributions of industry and academic experts and helps provide a cross-discipline overview of the security and practical issues for embedded systems, tokens, and platforms. It is an ideal complement to the earlier work, Smart Cards Tokens, Security and Applications from the same editors.
An Introduction to Smart Cards and RFIDs.- Embedded DSP Devices.- Microprocessors & Microcontrollers Security.- An Introduction to the Trusted Platform Module and Mobile Trusted Module.- Hardware and VLSI Designs.- Information Security Best Practices.- Smart Card Security.- Graphics Processing Units.- A Survey of Recent Results in FPGA Security and Intellectual Property Protection.- Mobile Communication Security Controllers.- Security of Embedded Location Systems.- Automotive Embedded Systems.- Analysis of Potential Vulnerabilities in Payment Terminals.- Wireless Sensor Nodes.- Near Field Communication.- The BIOS and Rootkits.- Hardware Security Modules.- Security Evaluation and Common Criteria.- Physical Security Primitives.- SCADA System Cyber Security.- An Overview of PIC Microcontrollers and their Suitability for Cryptographic Algorithms.- An Introduction to Java Card Programming.- A Practical Example of Mobile Phone Application using SATSA (JSR 177) API.- Wireless Sensors(Languages/Programming/Developments/Tools/Examples).
Erscheint lt. Verlag | 14.9.2013 |
---|---|
Zusatzinfo | XLI, 568 p. 135 illus. |
Verlagsort | New York |
Sprache | englisch |
Themenwelt | Mathematik / Informatik ► Informatik ► Datenbanken |
Informatik ► Netzwerke ► Sicherheit / Firewall | |
Informatik ► Theorie / Studium ► Algorithmen | |
Technik ► Elektrotechnik / Energietechnik | |
Technik ► Nachrichtentechnik | |
Schlagworte | Applications • Attacks • Automotive • cryptography • Embedd • Embedded Systems • GPS • microprocessors • mobile phones • Near field Communications (NFC) • platforms • programming • protocols • Satellite TV set-top-boxes • security • Smart cards • Terminals • wireless sensor nodes |
ISBN-10 | 1-4614-7915-0 / 1461479150 |
ISBN-13 | 978-1-4614-7915-4 / 9781461479154 |
Haben Sie eine Frage zum Produkt? |
Größe: 10,7 MB
DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasserzeichen und ist damit für Sie personalisiert. Bei einer missbräuchlichen Weitergabe des eBooks an Dritte ist eine Rückverfolgung an die Quelle möglich.
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.
Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich