Practical embedded security building secure resource-constrained systems
| Main Author: | Stapko, Timothy (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Amsterdam, Netherlands
Elsevier/Newnes
c2008
|
| Series: | Embedded technology series
|
| Subjects: |
Similar Items
Embedded hardware
by: Ganssle, Jack
Published: (2008)
by: Ganssle, Jack
Published: (2008)
Rugged embedded systems computing in harsh environments
by: Vega, Augusto, et al.
Published: (2017)
by: Vega, Augusto, et al.
Published: (2017)
Testing complex and embedded systems
by: Pries, Kim H. , 1955-, et al.
Published: (2011)
by: Pries, Kim H. , 1955-, et al.
Published: (2011)
Embedded software
by: Labrosse, Jean
Published: (2008)
by: Labrosse, Jean
Published: (2008)
Embedded software for the IOT
by: Elk, Klaus
by: Elk, Klaus
Windows XP embedded advanced
by: Liming, Sean D.
Published: (2003)
by: Liming, Sean D.
Published: (2003)
Embedded systems handbook
by: Zurawski, Richard
Published: (2009)
by: Zurawski, Richard
Published: (2009)
Windows XP Embedded step by step
by: Cseri, James Beau
Published: (2003)
by: Cseri, James Beau
Published: (2003)
Fast and effective embedded systems design applying the ARM mbed
by: Toulson, Rob, et al.
Published: (2017)
by: Toulson, Rob, et al.
Published: (2017)
Real-time embedded components and systems
by: Siewert, Sam
Published: (2007)
by: Siewert, Sam
Published: (2007)
Worst-case execution time aware compilation techniques for real-time systems
by: Lokuciejewski, Paul, et al.
Published: (2011)
by: Lokuciejewski, Paul, et al.
Published: (2011)
Embedded programming with the microsoft .net micro framework
by: Thompson, Donald, et al.
Published: (2007)
by: Thompson, Donald, et al.
Published: (2007)
Distributed embedded control systems improving dependability with coherent design
by: Colnaric', M. (Matjaz'), et al.
Published: (2008)
by: Colnaric', M. (Matjaz'), et al.
Published: (2008)
Real-time embedded components and systems using Linux and RTOS
by: Siewert, Sam, et al.
Published: (2016)
by: Siewert, Sam, et al.
Published: (2016)
Reconfigurable system design and verification
by: Hsiung, Pao-Ann, et al.
Published: (2009)
by: Hsiung, Pao-Ann, et al.
Published: (2009)
The craft system security
by: Smith, Sean W. 1964-, et al.
Published: (2008)
by: Smith, Sean W. 1964-, et al.
Published: (2008)
Network security : an introduction to techniques & standard
by: Kamaruzzaman Seman, et al.
Published: (2007)
by: Kamaruzzaman Seman, et al.
Published: (2007)
Building an effective information security policy architecture
by: Bacik, Sandy
Published: (2008)
by: Bacik, Sandy
Published: (2008)
Information security the complete reference
by: Rhodes-Ousley, Mark
Published: (2013)
by: Rhodes-Ousley, Mark
Published: (2013)
Understanding security issues
by: Donaldson, Scott E., et al.
by: Donaldson, Scott E., et al.
Computer security fundamentals
by: Easttom, Chuck
Published: (2006)
by: Easttom, Chuck
Published: (2006)
Computer security fundamentals
by: Easttom, Chuck
Published: (2016)
by: Easttom, Chuck
Published: (2016)
Principles of information security
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
Computer security fundamentals
by: Easttom, Chuck
Published: (2012)
by: Easttom, Chuck
Published: (2012)
Fundamentals of network security
by: Canavan, John E.
Published: (2001)
by: Canavan, John E.
Published: (2001)
Principles of information systems security text and cases
by: Dhillon, Gurpreet 1963-
Published: (2007)
by: Dhillon, Gurpreet 1963-
Published: (2007)
Security in fixed and wireless networks
by: Schaefer, Guenter, et al.
Published: (2014)
by: Schaefer, Guenter, et al.
Published: (2014)
Introduction to security and network forensics
by: Buchanan, William J. 1926-2005
Published: (2011)
by: Buchanan, William J. 1926-2005
Published: (2011)
Information security and IT risk management
by: Agrawal, Manish, et al.
by: Agrawal, Manish, et al.
Network security essentials applications and standards
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Network security essentials applications and standards
by: Stallings, William
Published: (2007)
by: Stallings, William
Published: (2007)
Network security essentials applications and standards
by: Stallings, William
Published: (2014)
by: Stallings, William
Published: (2014)
Computer and cyber security principles, algorithm, applications, and perspectives
How to cheat at securing your network
by: Dubrawsky, Ido
Published: (2007)
by: Dubrawsky, Ido
Published: (2007)
Web commerce security design and development
by: Nahari, Hadi, et al.
Published: (2011)
by: Nahari, Hadi, et al.
Published: (2011)
Assembly language programming ARM Cortex-M3
by: Mahout, Vincent
Published: (2012)
by: Mahout, Vincent
Published: (2012)
Security and resilience in intelligent data-centric systems and communication networks
Network security
by: Shaffer, Steven L.
Published: (1994)
by: Shaffer, Steven L.
Published: (1994)
Database security
by: Basta, Alfred, et al.
Published: (2012)
by: Basta, Alfred, et al.
Published: (2012)
Cloud security : a general guide to secured computing
by: Masnida Hussin, et al.
Published: (2021)
by: Masnida Hussin, et al.
Published: (2021)
Similar Items
-
Embedded hardware
by: Ganssle, Jack
Published: (2008) -
Rugged embedded systems computing in harsh environments
by: Vega, Augusto, et al.
Published: (2017) -
Testing complex and embedded systems
by: Pries, Kim H. , 1955-, et al.
Published: (2011) -
Embedded software
by: Labrosse, Jean
Published: (2008) -
Embedded software for the IOT
by: Elk, Klaus