Embedded systems security: practical methods for safe and secure software and systems development
The ultimate resource for making embedded systems reliable, safe, and secure Embedded Systems Security provides: A broad understanding of security principles, concerns, and technologies Proven techniques for the efficient development of safe and secure embedded software. A study of the system archit...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam [und 12 weitere]
Elsevier/Newnes
[2012]
|
Ausgabe: | 1st ed |
Schlagworte: | |
Online-Zugang: | FHM01 FLA01 URL des Erstveröffentlichers |
Zusammenfassung: | The ultimate resource for making embedded systems reliable, safe, and secure Embedded Systems Security provides: A broad understanding of security principles, concerns, and technologies Proven techniques for the efficient development of safe and secure embedded software. A study of the system architectures, operating systems and hypervisors, networking, storage, and cryptographic issues that must be considered when designing secure embedded systems. Nuggets of practical advice and numerous case studies throughout |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | 1 online resource (xx, 396 pages) color illustrations |
ISBN: | 9780123868879 0123868874 9780123868862 0123868866 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046125795 | ||
003 | DE-604 | ||
005 | 20220124 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2012 |||| o||u| ||||||eng d | ||
020 | |a 9780123868879 |9 978-0-12-386887-9 | ||
020 | |a 0123868874 |9 0-12-386887-4 | ||
020 | |a 9780123868862 |9 978-0-12-386886-2 | ||
020 | |a 0123868866 |9 0-12-386886-6 | ||
024 | 7 | |a 10.1016/C2010-0-67275-0 |2 doi | |
035 | |a (ZDB-33-ESD)ocn787847109 | ||
035 | |a (OCoLC)787847109 | ||
035 | |a (DE-599)BVBBV046125795 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-M347 | ||
082 | 0 | |a 005.10685 | |
100 | 1 | |a Kleidermacher, David |e Verfasser |4 aut | |
245 | 1 | 0 | |a Embedded systems security |b practical methods for safe and secure software and systems development |c David Kleidermacher, Mike Kleidermacher |
250 | |a 1st ed | ||
264 | 1 | |a Amsterdam [und 12 weitere] |b Elsevier/Newnes |c [2012] | |
264 | 4 | |c © 2012 | |
300 | |a 1 online resource (xx, 396 pages) |b color illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | |a The ultimate resource for making embedded systems reliable, safe, and secure Embedded Systems Security provides: A broad understanding of security principles, concerns, and technologies Proven techniques for the efficient development of safe and secure embedded software. A study of the system architectures, operating systems and hypervisors, networking, storage, and cryptographic issues that must be considered when designing secure embedded systems. Nuggets of practical advice and numerous case studies throughout | ||
650 | 7 | |a COMPUTERS / Software Development & Engineering / Project Management |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Computer software / Development |2 fast | |
650 | 4 | |a Computer software |x Development | |
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheit |0 (DE-588)4054790-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Eingebettetes System |0 (DE-588)4396978-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Eingebettetes System |0 (DE-588)4396978-1 |D s |
689 | 0 | 1 | |a Sicherheit |0 (DE-588)4054790-5 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
689 | 1 | 0 | |a Eingebettetes System |0 (DE-588)4396978-1 |D s |
689 | 1 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | |8 2\p |5 DE-604 | |
700 | 1 | |a Kleidermacher, Mike |e Verfasser |4 aut | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9780123868862 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031506248 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://doi.org/10.1016/C2010-0-67275-0 |l FHM01 |p ZDB-33-ESD |q FHM_Einzelkauf |x Verlag |3 Volltext | |
966 | e | |u http://www.sciencedirect.com/science/book/9780123868862 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180445286367232 |
---|---|
any_adam_object | |
author | Kleidermacher, David Kleidermacher, Mike |
author_facet | Kleidermacher, David Kleidermacher, Mike |
author_role | aut aut |
author_sort | Kleidermacher, David |
author_variant | d k dk m k mk |
building | Verbundindex |
bvnumber | BV046125795 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocn787847109 (OCoLC)787847109 (DE-599)BVBBV046125795 |
dewey-full | 005.10685 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.10685 |
dewey-search | 005.10685 |
dewey-sort | 15.10685 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 1st ed |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03108nmm a2200625zc 4500</leader><controlfield tag="001">BV046125795</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220124 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2012 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780123868879</subfield><subfield code="9">978-0-12-386887-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0123868874</subfield><subfield code="9">0-12-386887-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780123868862</subfield><subfield code="9">978-0-12-386886-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0123868866</subfield><subfield code="9">0-12-386886-6</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1016/C2010-0-67275-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn787847109</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)787847109</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046125795</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-M347</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.10685</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kleidermacher, David</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Embedded systems security</subfield><subfield code="b">practical methods for safe and secure software and systems development</subfield><subfield code="c">David Kleidermacher, Mike Kleidermacher</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam [und 12 weitere]</subfield><subfield code="b">Elsevier/Newnes</subfield><subfield code="c">[2012]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xx, 396 pages)</subfield><subfield code="b">color illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The ultimate resource for making embedded systems reliable, safe, and secure Embedded Systems Security provides: A broad understanding of security principles, concerns, and technologies Proven techniques for the efficient development of safe and secure embedded software. A study of the system architectures, operating systems and hypervisors, networking, storage, and cryptographic issues that must be considered when designing secure embedded systems. Nuggets of practical advice and numerous case studies throughout</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Software Development & Engineering / Project Management</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer software / Development</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer software</subfield><subfield code="x">Development</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Eingebettetes System</subfield><subfield code="0">(DE-588)4396978-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Eingebettetes System</subfield><subfield code="0">(DE-588)4396978-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Eingebettetes System</subfield><subfield code="0">(DE-588)4396978-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kleidermacher, Mike</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9780123868862</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031506248</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1016/C2010-0-67275-0</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FHM_Einzelkauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780123868862</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046125795 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:35:52Z |
institution | BVB |
isbn | 9780123868879 0123868874 9780123868862 0123868866 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031506248 |
oclc_num | 787847109 |
open_access_boolean | |
owner | DE-M347 |
owner_facet | DE-M347 |
physical | 1 online resource (xx, 396 pages) color illustrations |
psigel | ZDB-33-ESD ZDB-33-ESD FHM_Einzelkauf ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Elsevier/Newnes |
record_format | marc |
spelling | Kleidermacher, David Verfasser aut Embedded systems security practical methods for safe and secure software and systems development David Kleidermacher, Mike Kleidermacher 1st ed Amsterdam [und 12 weitere] Elsevier/Newnes [2012] © 2012 1 online resource (xx, 396 pages) color illustrations txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index The ultimate resource for making embedded systems reliable, safe, and secure Embedded Systems Security provides: A broad understanding of security principles, concerns, and technologies Proven techniques for the efficient development of safe and secure embedded software. A study of the system architectures, operating systems and hypervisors, networking, storage, and cryptographic issues that must be considered when designing secure embedded systems. Nuggets of practical advice and numerous case studies throughout COMPUTERS / Software Development & Engineering / Project Management bisacsh Computer security fast Computer software / Development fast Computer software Development Computer security Computersicherheit (DE-588)4274324-2 gnd rswk-swf Sicherheit (DE-588)4054790-5 gnd rswk-swf Eingebettetes System (DE-588)4396978-1 gnd rswk-swf Eingebettetes System (DE-588)4396978-1 s Sicherheit (DE-588)4054790-5 s 1\p DE-604 Computersicherheit (DE-588)4274324-2 s 2\p DE-604 Kleidermacher, Mike Verfasser aut http://www.sciencedirect.com/science/book/9780123868862 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Kleidermacher, David Kleidermacher, Mike Embedded systems security practical methods for safe and secure software and systems development COMPUTERS / Software Development & Engineering / Project Management bisacsh Computer security fast Computer software / Development fast Computer software Development Computer security Computersicherheit (DE-588)4274324-2 gnd Sicherheit (DE-588)4054790-5 gnd Eingebettetes System (DE-588)4396978-1 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4054790-5 (DE-588)4396978-1 |
title | Embedded systems security practical methods for safe and secure software and systems development |
title_auth | Embedded systems security practical methods for safe and secure software and systems development |
title_exact_search | Embedded systems security practical methods for safe and secure software and systems development |
title_full | Embedded systems security practical methods for safe and secure software and systems development David Kleidermacher, Mike Kleidermacher |
title_fullStr | Embedded systems security practical methods for safe and secure software and systems development David Kleidermacher, Mike Kleidermacher |
title_full_unstemmed | Embedded systems security practical methods for safe and secure software and systems development David Kleidermacher, Mike Kleidermacher |
title_short | Embedded systems security |
title_sort | embedded systems security practical methods for safe and secure software and systems development |
title_sub | practical methods for safe and secure software and systems development |
topic | COMPUTERS / Software Development & Engineering / Project Management bisacsh Computer security fast Computer software / Development fast Computer software Development Computer security Computersicherheit (DE-588)4274324-2 gnd Sicherheit (DE-588)4054790-5 gnd Eingebettetes System (DE-588)4396978-1 gnd |
topic_facet | COMPUTERS / Software Development & Engineering / Project Management Computer security Computer software / Development Computer software Development Computersicherheit Sicherheit Eingebettetes System |
url | http://www.sciencedirect.com/science/book/9780123868862 |
work_keys_str_mv | AT kleidermacherdavid embeddedsystemssecuritypracticalmethodsforsafeandsecuresoftwareandsystemsdevelopment AT kleidermachermike embeddedsystemssecuritypracticalmethodsforsafeandsecuresoftwareandsystemsdevelopment |