MARC details
| 000 -LEADER |
| fixed length control field |
03126cam a22003617i 4500 |
| 001 - CONTROL NUMBER |
| control field |
17130971 |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20210427112119.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
120123s2012 ne a b 001 0 eng d |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
| LC control number |
2012931463 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9780123868862 (pbk.) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
0123868866 (pbk.) |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
BTCTA |
| Transcribing agency |
BTCTA |
| Modifying agency |
UKMGB |
| -- |
YDXCP |
| -- |
BWX |
| -- |
YNK |
| -- |
CUV |
| -- |
CDX |
| -- |
NLE |
| -- |
DLC |
| Description conventions |
rda |
| 050 00 - LIBRARY OF CONGRESS CALL NUMBER |
| Classification number |
QA76.76.D47 |
| Item number |
K5634 2012 |
| 082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
005.8 |
| Edition number |
23 |
| Item number |
K.D.E |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Kleidermacher, David. |
| 245 10 - TITLE STATEMENT |
| Title |
Embedded systems security : |
| Remainder of title |
practical methods for safe and secure software and systems development / |
| Statement of responsibility, etc |
David Kleidermacher, Mike Kleidermacher. |
| 250 ## - EDITION STATEMENT |
| Edition statement |
First Edition. |
| 264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
| Place of publication, distribution, etc |
Amsterdam : |
| Name of publisher, distributor, etc |
Elsevier, |
| Date of publication, distribution, etc |
2012. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
xx, 396 pages. : |
| Other physical details |
illustrations ; |
| Dimensions |
24 cm. |
| 336 ## - CONTENT TYPE |
| Source |
rdacontent |
| Content type term |
text |
| 337 ## - MEDIA TYPE |
| Source |
rdamedia |
| Media type term |
unmediated |
| 338 ## - CARRIER TYPE |
| Source |
rdacarrier |
| Carrier type term |
volume |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc |
Includes bibliographical references and index. |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Chapter 1. Introduction to Embedded Systems Security<br/>1.1 What is Security?<br/>1.2 What is an Embedded System?<br/>1.3 Embedded Security Trends<br/>1.4 Security Policies<br/>1.5 Security Threats<br/>1.6 Wrap-up<br/>1.7 Key Points<br/>1.8 Bibliography and Notes<br/>Chapter 2. Systems Software Considerations<br/>2.1 The Role of the Operating System<br/>2.2 Multiple Independent Levels of Security<br/>2.3 Microkernel versus Monolith<br/>2.4 Core Embedded Operating System Security Requirements<br/>2.5 Access Control and Capabilities<br/>2.6 Hypervisors and System Virtualization<br/>2.7 I/O Virtualization<br/>2.8 Remote Management<br/>2.9 Assuring Integrity of the TCB<br/>2.10 Key Points<br/>2.11 Bibliography and Notes<br/> |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Chapter 3. Secure Embedded Software Development<br/>3.1 Introduction to PHASE—Principles of High-Assurance Software Engineering<br/>3.2 Minimal Implementation<br/>3.3 Component Architecture<br/>3.4 Least Privilege<br/>3.5 Secure Development Process<br/>3.6 Independent Expert Validation<br/>3.7 Case Study: HAWS—High-Assurance Web Server<br/>3.8 Model-Driven Design<br/>3.9 Key Points<br/>3.10 Bibliography and Notes<br/>Chapter 4. Embedded Cryptography<br/>4.1 Introduction<br/>4.2 U.S. Government Cryptographic Guidance<br/>4.3 The One-Time Pad<br/>4.4 Cryptographic Modes<br/>4.5 Block Ciphers<br/>4.6 Authenticated Encryption<br/>4.7 Public Key Cryptography<br/>4.8 Key Agreement<br/>4.9 Public Key Authentication<br/>4.10 Elliptic Curve Cryptography<br/>4.11 Cryptographic Hashes<br/>4.12 Message Authentication Codes<br/>4.13 Random Number Generation<br/>4.14 Key Management for Embedded Systems<br/>4.15 Cryptographic Certifications<br/>4.16 Key Points<br/>4.14 Bibliography and Notes<br/>Chapter 5. Data Protection Protocols for Embedded Systems<br/>5.1 Introduction<br/>5.2 Data-in-Motion Protocols<br/>5.3 Data-at-Rest Protocols<br/>5.4 Key Points<br/>5.5 Bibliography and Notes<br/> |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Chapter 6. Emerging Applications<br/>6.1 Embedded Network Transactions<br/>6.2 Automotive Security<br/>6.3 Secure Android<br/>6.4 Next-Generation Software-Defined Radio<br/>6.5 Key Points<br/>6.6 Bibliography and Notes<br/><br/> |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer software |
| General subdivision |
Development. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer security. |
| 655 #4 - INDEX TERM--GENRE/FORM |
| Genre/form data or focus term |
Electronic books. |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Kleidermacher, Mike. |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Koha item type |
Books |
| Source of classification or shelving scheme |
Dewey Decimal Classification |