MicroController Pros Home Page My Account  Cart Contents  Checkout  
  Store » ELV9780750682152 My Account  |  Cart Contents  |  Checkout   
Quick Find
Enter keywords to find the product you are looking for in the Quick Find field above

or use
Advanced Search
Accessory Boards->
ADI Blackfin
Atmel AVR->
Cypress PSoC
Microchip PIC->
Silicon Labs
ST Microelectronics->
Texas Instruments->
Embedded Ethernet->
Embedded Software->
I/O Modules->
Parts & Components->
Pick & Place Tools
Programmable Logic (PLD)
Prototype PCBs->
ROM/Flash Emulators
Test & Measurement->
Tutorial Software
Universal Programmers->
Intro to Embedded Tools
Embedded News Digest
Useful Resources
Shipping & Returns
Warranty & Liability
Privacy Notice
Conditions of Use
Contact Us
Practical Embedded Security US$62.95

Practical Embedded Security

Building Secure Resource-Constrained Systems (Embedded Technology)

Dedicated to a comprehensive coverage of embedded security, this book covers both hardware and software-based embedded security solutions for preventing and dealing with attacks. Application case studies support practical explanations of all key topics, including network protocols, wireless and cellular communications, languages (Java and C/++), compilers, web-based interfaces, cryptography, and an entire section on SSL.

This book builds upon the basics of computer security and optimizes it for embedded systems. Often, embedded systems are resource-constrained and therefore may not have the power to implement robust security systems. Author Timothy Stapko takes on this problem, showing embedded designers, programmers, and engineers how to build secure, low-cost, and resource-constrained systems.

Various techniques and tools are provided, including:

  • Designing embedded-specific security protocols
  • Recognizing and dealing with attacks
  • Common pitfalls when trying to optimize security
  • A discussion of hardware alternatives
  • C and other languages, and their strengths and weaknesses
  • A look at low-level networking protocols: TCP/IP, UDP, PPP, and Ethernet
  • An entire chapter on Secure Socket Layers (SSL)
  • Strategies for choosing algorithms and protocols for a particular platform
  • Working with wireless networking protocols: Bluetooth, ZigBee, and 802.11
  • Client/server applications detailed

Book Details

  • Paperback; 480 pages
  • Publisher: Newnes (August 24, 2007)
  • Author: Timothy Stapko
  • Language: English
  • Dimensions: 9.2 x 7.4 x 0.9 inches
  • Shipping Weight: 1.4 pounds

Table of Contents

    Chapter 1: Computer security introduction and review
    Chapter 2: Network communications protocols and built-in security
    Chapter 3: Security protocols and algorithms
    Chapter 4: The secure sockets layer
    Chapter 5: Embedded security
    Chapter 6: Wireless
    Chapter 7: Application-layer and client/server protocols
    Chapter 8: Choosing and optimizing cryptographic algorithms for resource-constrained systems
    Chapter 9: Hardware-based security
    Chapter 10: Conclusion -- miscellaneous security issues and the future of embedded applications security
    Chapter 11: PIC case study
    Chapter 12: Rabbit case study

This product was added to our catalog on Friday 05 October, 2007.


Shopping Cart more
0 items
What's New? more
Flowcode 7 "Misc Pack A" Feature Pack
Flowcode 7 "Misc Pack A" Feature Pack
Specials more
XBee ZB S2 ZigBee Module, 2 mW, U.FL Connector
XBee ZB S2 ZigBee Module, 2 mW, U.FL Connector
Tell A Friend

Tell someone you know about this product.
Notifications more
NotificationsNotify me of updates to Practical Embedded Security
Reviews more
Write ReviewWrite a review on this product!
  Friday 07 August, 2020   List of all our Products

Copyright © 2003-2017 MicroController Pros LLC
Powered by osCommerce