Embedded systems security: practical methods for safe and secure software and systems development
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Amsterdam [u.a.]
Elsevier
2012
|
Ausgabe: | 1. publ. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XX, 396 S. Ill., graph. Darst. |
ISBN: | 9780123868862 0123868866 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV040484400 | ||
003 | DE-604 | ||
005 | 20131219 | ||
007 | t | ||
008 | 121015s2012 ad|| |||| 00||| eng d | ||
020 | |a 9780123868862 |9 978-0-12-386886-2 | ||
020 | |a 0123868866 |9 0-12-386886-6 | ||
035 | |a (OCoLC)810311187 | ||
035 | |a (DE-599)BVBBV040484400 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-Aug4 |a DE-29T |a DE-739 |a DE-634 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 153 |0 (DE-625)143597: |2 rvk | ||
100 | 1 | |a Kleidermacher, David |e Verfasser |4 aut | |
245 | 1 | 0 | |a Embedded systems security |b practical methods for safe and secure software and systems development |c David Kleidermacher ; Mike Kleidermacher |
250 | |a 1. publ. | ||
264 | 1 | |a Amsterdam [u.a.] |b Elsevier |c 2012 | |
300 | |a XX, 396 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Computer software / Development | |
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a Eingebettetes System |0 (DE-588)4396978-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheit |0 (DE-588)4054790-5 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Eingebettetes System |0 (DE-588)4396978-1 |D s |
689 | 0 | 1 | |a Sicherheit |0 (DE-588)4054790-5 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Eingebettetes System |0 (DE-588)4396978-1 |D s |
689 | 1 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
700 | 1 | |a Kleidermacher, Mike |e Verfasser |4 aut | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025331555&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-025331555 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804149545319268352 |
---|---|
adam_text | Titel: Embedded systems security
Autor: Kleidermacher, David
Jahr: 2012
Contents
Foreword..........................................................................................................xi
Preface...........................................................................................................xiii
Acknowledgements...........................................................................................xix
Chapter 1 Introduction to Embedded Systems Security..........................................1
1.1 What is Security?...................................................................................................1
1.2 What is an Embedded System?.............................................................................2
1.3 Embedded Security Trends....................................................................................4
1.3.1 Embedded Systems Complexity......................................................................4
1.3.2 Network Connectivity....................................................................................12
1.3.3 Reliance on Embedded Systems for Critical Infrastructure..........................14
1.3.4 Sophisticated Attackers..................................................................................15
1.3.5 Processor Consolidation.................................................................................16
1.4 Security Policies..................................................................................................18
1.4.1 Perfect Security..............................................................................................18
1.4.2 Confidentiality, Integrity, and Availability....................................................18
1.4.3 Isolation..........................................................................................................19
1.4.4 Information Row Control..............................................................................20
1.4.5 Physical Security Policies..............................................................................21
1.4.6 Application-Specific Policies.........................................................................21
1.5 Security Threats...................................................................................................22
1.5.1 Case Study: VxWorks Debug Port Vulnerability..........................................22
1.6 Wrap-up...............................................................................................................23
1.7 Key Points............................................................................................................23
1.8 Bibliography and Notes.......................................................................................24
Chapter 2 Systems Software Considerations.......................................................25
2.1 The Role of the Operating System......................................................................26
2.2 Multiple Independent Levels of Security............................................................27
2.2.1 Information Flow............................................................................................27
2.2.2 Data Isolation.................................................................................................27
2.2.3 Damage Limitation........................................................................................28
2.2.4 Periods Processing.........................................................................................28
vi Contents
2.2.5 Always Invoked..............................................................................................29
2.2.6 Tamper Proof..................................................................................................29
2.2.7 Evaluable........................................................................................................29
2.3 Microkernel versus Monolith..............................................................................31
2.3.1 Case Study: The Duqu Virus.........................................................................34
2.4 Core Embedded Operating System Security Requirements...............................34
2.4.1 Memory Protection.........................................................................................34
2.4.2 Virtual Memory..............................................................................................35
2.4.3 Fault Recovery...............................................................................................37
2.4.4 Guaranteed Resources....................................................................................38
2.4.5 Virtual Device Drivers...................................................................................41
2.4.6 Impact of Determinism..................................................................................42
2.4.7 Secure Scheduling..........................................................................................45
2.5 Access Control and Capabilities.........................................................................46
2.5.1 Case Study: Secure Web Browser.................................................................47
2.5.2 Granularity versus Simplicity of Access Controls........................................49
2.5.3 Whitelists versus Blacklists...........................................................................51
2.5.4 Confused Deputy Problem.............................................................................53
2.5.5 Capabilities versus Access Control Lists......................................................53
2.5.6 Capability Confinement and Revocation.......................................................58
2.5.7 Secure Design Using Capabilities.................................................................60
2.6 Hypervisors and System Virtualization...............................................................61
2.6.1 Introduction to System Virtualization............................................................64
2.6.2 Applications of System Virtualization...........................................................65
2.6.3 Environment Sandboxing...............................................................................65
2.6.4 Virtual Security Appliances...........................................................................65
2.6.5 Hypervisor Architectures...............................................................................66
2.6.6 Paravirtualization............................................................................................69
2.6.7 Leveraging Hardware Assists for Virtualization...........................................70
2.6.8 Hypervisor Security.......................................................................................73
2.7 I/O Virtualization.................................................................................................74
2.7.1 The Need for Shared I/O...............................................................................75
2.7.2 Emulation.......................................................................................................75
2.7.3 Pass-through...................................................................................................76
2.7.4 Shared IOMMU..............................................................................................78
2.7.5 IOMMUs and Virtual Device Drivers...........................................................78
2.7.6 Secure I/O Virtualization within Microkernels.............................................79
2.8 Remote Management...........................................................................................80
2.8.1 Security Implications.....................................................................................81
2.9 Assuring Integrity of the TCB............................................................................83
2.9.1 Trusted Hardware and Supply Chain................................................83
2.9.2 Secure Boot....................................................................................................84
2.9.3 Static versus Dynamic Root of Trust.............................................................84
2.9.4 Remote Attestation........................ ........................87
Contents vii
2.10 Key Points..........................................................................................................88
2.11 Bibliography and Notes.....................................................................................90
Chapter 3 Secure Embedded Software Development...........................................93
3.1 Introduction to PHASE?Principles of High-Assurance Software
Engineering..........................................................................................................94
3.2 Minimal Implementation.....................................................................................95
3.3 Component Architecture......................................................................................96
3.3.1 Runtime Componentization...........................................................................98
3.3.2 A Note on Processes versus Threads.............................................................99
3.4 Least Privilege...................................................................................................100
3.5 Secure Development Process............................................................................100
3.5.1 Change Management....................................................................................101
3.5.2 Peer Reviews................................................................................................101
3.5.3 Development Tool Security.........................................................................104
3.5.4 Secure Coding..............................................................................................107
3.5.5 Software Testing and Verification................................................................146
3.5.6 Development Process Efficiency.................................................................154
3.6 Independent Expert Validation..........................................................................156
3.6.1 Common Criteria..........................................................................................157
3.6.2 Case Study: Operating System Protection Profiles.....................................160
3.7 Case Study: HAWS?High-Assurance Web Server.........................................165
3.7.1 Minimal Implementation..............................................................................166
3.7.2 Component Architecture..............................................................................168
3.7.3 Least Privilege..............................................................................................168
3.7.4 Secure Development Process.......................................................................169
3.7.5 Independent Expert Validation.....................................................................169
3.8 Model-Driven Design........................................................................................169
3.8.1 Introduction to MDD...................................................................................170
3.8.2 Executable Models.......................................................................................174
3.8.3 Modeling Languages....................................................................................177
3.8.4 Types of MDD Platforms.............................................................................182
3.8.5 Case Study: A Digital Pathology Scanner...................................................183
3.8.6 Selecting an MDD Platform........................................................................191
3.8.7 Using MDD in Safety- and Security-Critical Systems...............................201
3.9 Key Points..........................................................................................................202
3.10 Bibliography and Notes...................................................................................206
Chapter 4 Embedded Cryptography.................................................................209
4.1 Introduction........................................................................................................210
4.2 U.S. Government Cryptographic Guidance......................................................211
4.2.1 NSA Suite B.................................................................................................212
4.3 The One-Time Pad.............................................................................................213
4.3.1 Cryptographic Synchronization...................................................................222
viii Contents
4.4 Cryptographic Modes........................................................................................224
4.4.1 Output Feedback..........................................................................................224
4.4.2 Cipher Feedback...........................................................................................225
4.4.3 OFB with CFB Protection............................................................................226
4.4.4 Traffic Flow Security...................................................................................227
4.4.5 Counter Mode...............................................................................................227
4.5 Block Ciphers....................................................................................................228
4.5.1 Additional Cryptographic Block Cipher Modes..........................................231
4.6 Authenticated Encryption..................................................................................232
4.6.1 CCM.............................................................................................................233
4.6.2 Galois Counter Mode...................................................................................233
4.7 Public Key Cryptography..................................................................................233
4.7.1 RSA..............................................................................................................236
4.7.2 Equivalent Key Strength..............................................................................236
4.7.3 Trapdoor Construction.................................................................................238
4.8 Key Agreement..................................................................................................239
4.8.1 Man-in-the-Middle Attack on Diffie-Hellman............................................241
4.9 Public Key Authentication................................................................................241
4.9.1 Certificate Types...........................................................................................242
4.10 Elliptic Curve Cryptography...........................................................................244
4.10.1 Elliptic Curve Digital Signatures...............................................................245
4.10.2 Elliptic Curve Anonymous Key Agreement..............................................245
4.11 Cryptographic Hashes......................................................................................245
4.11.1 Secure Hash Algorithm..............................................................................246
4.11.2 MMO..........................................................................................................247
4.12 Message Authentication Codes.......................................................................248
4.13 Random Number Generation...........................................................................248
4.13.1 True Random Number Generation............................................................249
4.13.2 Pseudo-Random Number Generation........................................................254
4.14 Key Management for Embedded Systems......................................................256
4.14.1 Case Study: The Walker Spy Case............................................................257
4.14.2 Key Management?Generalized Model....................................................258
4.14.3 Key Management Case Studies.................................................................264
4.15 Cryptographic Certifications............................................................................277
4.15.1 FTPS 140-2 Certification............................................................................277
4.15.2 NSA Certification.......................................................................................280
4.16 Key Points........................................................................................................285
4.17 Bibliography and Notes...................................................................................287
Chapter 5 Data Protection Protocols for Embedded Systems..............................289
5.1 Introduction........................................................................................................290
5.2 Data-in-Motion Protocols..................................................................................291
5.2.1 Generalized Model.......................................................................................291
5.2.2 Choosing the Network Layer for Security..................................................296
Contents ix
5.2.3 Ethernet Security Protocols.........................................................................297
5.2.4 IPsec versus SSL..........................................................................................301
5.2.5 IPsec.............................................................................................................303
5.2.6 SSL/TLS.......................................................................................................310
5.2.7 Embedded VPN Clients...............................................................................313
5.2.8 DTLS............................................................................................................315
5.2.9 SSH...............................................................................................................315
5.2.10 Custom Network Security Protocols.........................................................316
5.2.11 Application of Cryptography within Network Security Protocols...........319
5.2.12 Secure Multimedia Protocols.....................................................................320
5.2.13 Broadcast Security.....................................................................................324
5.3 Data-at-Rest Protocols.......................................................................................330
5.3.1 Choosing the Storage Layer for Security....................................................332
5.3.2 Symmetric Encryption Algorithm Selection...............................................334
5.3.3 Managing the Storage Encryption Key.......................................................338
5.3.4 Advanced Threats to Data Encryption Solutions........................................340
5.4 Key Points..........................................................................................................342
5.5 Bibliography and Notes.....................................................................................345
Chapter 6 Emerging Applications....................................................................349
6.1 Embedded Network Transactions......................................................................350
6.1.1 Anatomy of a Network Transaction............................................................351
6.1.2 State of Insecurity........................................................................................351
6.1.3 Network-based Transaction Threats............................................................352
6.1.4 Modern Attempts to Improve Network Transaction Security.....................355
6.1.5 Trustworthy Embedded Transaction Architecture.......................................362
6.2 Automotive Security..........................................................................................366
6.2.1 Vehicular Security Threats and Mitigations................................................366
6.3 Secure Android..................................................................................................369
6.3.1 Android Security Retrospective...................................................................369
6.3.2 Android Device Rooting..............................................................................371
6.3.3 Mobile Phone Data Protection: A Case Study of Defense-in-Depth..........372
6.3.4 Android Sandboxing Approaches................................................................373
6.4 Next-Generation Software-Defined Radio........................................................380
6.4.1 Red-Black Separation..................................................................................380
6.4.2 Software-Defined Radio Architecture..........................................................381
6.4.3 Enter Linux...................................................................................................382
6.4.4 Multi-Domain Radio....................................................................................383
6.5 Key Points..........................................................................................................385
6.6 Bibliography and Notes.....................................................................................386
Index............................................................................................................389
|
any_adam_object | 1 |
author | Kleidermacher, David Kleidermacher, Mike |
author_facet | Kleidermacher, David Kleidermacher, Mike |
author_role | aut aut |
author_sort | Kleidermacher, David |
author_variant | d k dk m k mk |
building | Verbundindex |
bvnumber | BV040484400 |
classification_rvk | ST 153 |
ctrlnum | (OCoLC)810311187 (DE-599)BVBBV040484400 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 1. publ. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01918nam a2200469 c 4500</leader><controlfield tag="001">BV040484400</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20131219 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">121015s2012 ad|| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780123868862</subfield><subfield code="9">978-0-12-386886-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0123868866</subfield><subfield code="9">0-12-386886-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)810311187</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV040484400</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-29T</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 153</subfield><subfield code="0">(DE-625)143597:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kleidermacher, David</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Embedded systems security</subfield><subfield code="b">practical methods for safe and secure software and systems development</subfield><subfield code="c">David Kleidermacher ; Mike Kleidermacher</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. publ.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam [u.a.]</subfield><subfield code="b">Elsevier</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XX, 396 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer software / Development</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Eingebettetes System</subfield><subfield code="0">(DE-588)4396978-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Eingebettetes System</subfield><subfield code="0">(DE-588)4396978-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Eingebettetes System</subfield><subfield code="0">(DE-588)4396978-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kleidermacher, Mike</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025331555&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025331555</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV040484400 |
illustrated | Illustrated |
indexdate | 2024-07-10T00:24:44Z |
institution | BVB |
isbn | 9780123868862 0123868866 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025331555 |
oclc_num | 810311187 |
open_access_boolean | |
owner | DE-Aug4 DE-29T DE-739 DE-634 |
owner_facet | DE-Aug4 DE-29T DE-739 DE-634 |
physical | XX, 396 S. Ill., graph. Darst. |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Elsevier |
record_format | marc |
spelling | Kleidermacher, David Verfasser aut Embedded systems security practical methods for safe and secure software and systems development David Kleidermacher ; Mike Kleidermacher 1. publ. Amsterdam [u.a.] Elsevier 2012 XX, 396 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Computer software / Development Computer security Eingebettetes System (DE-588)4396978-1 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Sicherheit (DE-588)4054790-5 gnd rswk-swf Eingebettetes System (DE-588)4396978-1 s Sicherheit (DE-588)4054790-5 s DE-604 Computersicherheit (DE-588)4274324-2 s 1\p DE-604 Kleidermacher, Mike Verfasser aut HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025331555&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Kleidermacher, David Kleidermacher, Mike Embedded systems security practical methods for safe and secure software and systems development Computer software / Development Computer security Eingebettetes System (DE-588)4396978-1 gnd Computersicherheit (DE-588)4274324-2 gnd Sicherheit (DE-588)4054790-5 gnd |
subject_GND | (DE-588)4396978-1 (DE-588)4274324-2 (DE-588)4054790-5 |
title | Embedded systems security practical methods for safe and secure software and systems development |
title_auth | Embedded systems security practical methods for safe and secure software and systems development |
title_exact_search | Embedded systems security practical methods for safe and secure software and systems development |
title_full | Embedded systems security practical methods for safe and secure software and systems development David Kleidermacher ; Mike Kleidermacher |
title_fullStr | Embedded systems security practical methods for safe and secure software and systems development David Kleidermacher ; Mike Kleidermacher |
title_full_unstemmed | Embedded systems security practical methods for safe and secure software and systems development David Kleidermacher ; Mike Kleidermacher |
title_short | Embedded systems security |
title_sort | embedded systems security practical methods for safe and secure software and systems development |
title_sub | practical methods for safe and secure software and systems development |
topic | Computer software / Development Computer security Eingebettetes System (DE-588)4396978-1 gnd Computersicherheit (DE-588)4274324-2 gnd Sicherheit (DE-588)4054790-5 gnd |
topic_facet | Computer software / Development Computer security Eingebettetes System Computersicherheit Sicherheit |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025331555&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT kleidermacherdavid embeddedsystemssecuritypracticalmethodsforsafeandsecuresoftwareandsystemsdevelopment AT kleidermachermike embeddedsystemssecuritypracticalmethodsforsafeandsecuresoftwareandsystemsdevelopment |