Ramdan Hours:
Sun - Thu
9.30 AM - 2.30 PM
Iftar in --:--:--
🌙 Maghrib: --:--

Embedded systems security : (Record no. 8228)

MARC details
000 -LEADER
fixed length control field 03126cam a22003617i 4500
001 - CONTROL NUMBER
control field 17130971
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20210427112119.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 120123s2012 ne a b 001 0 eng d
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2012931463
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780123868862 (pbk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0123868866 (pbk.)
040 ## - CATALOGING SOURCE
Original cataloging agency BTCTA
Transcribing agency BTCTA
Modifying agency UKMGB
-- YDXCP
-- BWX
-- YNK
-- CUV
-- CDX
-- NLE
-- DLC
Description conventions rda
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.76.D47
Item number K5634 2012
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
Item number K.D.E
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Kleidermacher, David.
245 10 - TITLE STATEMENT
Title Embedded systems security :
Remainder of title practical methods for safe and secure software and systems development /
Statement of responsibility, etc David Kleidermacher, Mike Kleidermacher.
250 ## - EDITION STATEMENT
Edition statement First Edition.
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Amsterdam :
Name of publisher, distributor, etc Elsevier,
Date of publication, distribution, etc 2012.
300 ## - PHYSICAL DESCRIPTION
Extent xx, 396 pages. :
Other physical details illustrations ;
Dimensions 24 cm.
336 ## - CONTENT TYPE
Source rdacontent
Content type term text
337 ## - MEDIA TYPE
Source rdamedia
Media type term unmediated
338 ## - CARRIER TYPE
Source rdacarrier
Carrier type term volume
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 1. Introduction to Embedded Systems Security<br/>1.1 What is Security?<br/>1.2 What is an Embedded System?<br/>1.3 Embedded Security Trends<br/>1.4 Security Policies<br/>1.5 Security Threats<br/>1.6 Wrap-up<br/>1.7 Key Points<br/>1.8 Bibliography and Notes<br/>Chapter 2. Systems Software Considerations<br/>2.1 The Role of the Operating System<br/>2.2 Multiple Independent Levels of Security<br/>2.3 Microkernel versus Monolith<br/>2.4 Core Embedded Operating System Security Requirements<br/>2.5 Access Control and Capabilities<br/>2.6 Hypervisors and System Virtualization<br/>2.7 I/O Virtualization<br/>2.8 Remote Management<br/>2.9 Assuring Integrity of the TCB<br/>2.10 Key Points<br/>2.11 Bibliography and Notes<br/>
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 3. Secure Embedded Software Development<br/>3.1 Introduction to PHASE—Principles of High-Assurance Software Engineering<br/>3.2 Minimal Implementation<br/>3.3 Component Architecture<br/>3.4 Least Privilege<br/>3.5 Secure Development Process<br/>3.6 Independent Expert Validation<br/>3.7 Case Study: HAWS—High-Assurance Web Server<br/>3.8 Model-Driven Design<br/>3.9 Key Points<br/>3.10 Bibliography and Notes<br/>Chapter 4. Embedded Cryptography<br/>4.1 Introduction<br/>4.2 U.S. Government Cryptographic Guidance<br/>4.3 The One-Time Pad<br/>4.4 Cryptographic Modes<br/>4.5 Block Ciphers<br/>4.6 Authenticated Encryption<br/>4.7 Public Key Cryptography<br/>4.8 Key Agreement<br/>4.9 Public Key Authentication<br/>4.10 Elliptic Curve Cryptography<br/>4.11 Cryptographic Hashes<br/>4.12 Message Authentication Codes<br/>4.13 Random Number Generation<br/>4.14 Key Management for Embedded Systems<br/>4.15 Cryptographic Certifications<br/>4.16 Key Points<br/>4.14 Bibliography and Notes<br/>Chapter 5. Data Protection Protocols for Embedded Systems<br/>5.1 Introduction<br/>5.2 Data-in-Motion Protocols<br/>5.3 Data-at-Rest Protocols<br/>5.4 Key Points<br/>5.5 Bibliography and Notes<br/>
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 6. Emerging Applications<br/>6.1 Embedded Network Transactions<br/>6.2 Automotive Security<br/>6.3 Secure Android<br/>6.4 Next-Generation Software-Defined Radio<br/>6.5 Key Points<br/>6.6 Bibliography and Notes<br/><br/>
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer software
General subdivision Development.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Kleidermacher, Mike.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Books
Source of classification or shelving scheme Dewey Decimal Classification
Holdings
Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Inventory number Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
  Dewey Decimal Classification     Computers & Information Technology ( Information systems ) Main library Main library A2 20/02/2014 Arab Oasis 330.00 PU   005.8 K.D.E 00010786 19/02/2025 20/02/2014 Books