1 / 299
文档名称:

Practical Embedded Security - Building Secure Resource-Constrained Systems (Newnes, 2008).pdf

格式:pdf   页数:299
下载后只包含 1 个 PDF 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

Practical Embedded Security - Building Secure Resource-Constrained Systems (Newnes, 2008).pdf

上传人:kuo08091 2014/6/8 文件大小:0 KB

下载得到文件列表

Practical Embedded Security - Building Secure Resource-Constrained Systems (Newnes, 2008).pdf

文档介绍

文档介绍:Practical Embedded Security
This page intentionally left blank
Practical Embedded Security
Building Secure Resource-Constrained Systems
By
Timothy Stapko
AMSTERDAM • BOSTON • HEIDELBERG • LONDON
NEW YORK • OXFORD • PARIS • SAN DIEGO
SAN FRANCISCO • SINGAPORE • SYDNEY • TOKYO
Newnes is an imprint of Elsevier
Newnes is an imprint of Elsevier
30 Corporate Drive, Suite 400, Burlington, MA 01803, USA
Linacre House, Jordan Hill, Oxford OX2 8DP, UK
Copyright © 2008, Elsevier Inc. All rights reserved.
Cover image by iStockphoto
No part of this publication may be reproduced, stored in a retrieval system, or transmitted in
any form or by any means, electronic, mechanical, photocopying, recording, or otherwise,
without the prior written permission of the publisher.
Permissions may be sought directly from Elsevier’s Science & Technology Rights
Department in Oxford, UK: phone: (+44) 1865 843830, fax: (+44) 1865 853333,
E-mail: ******@. You may plete your request online via the
Elsevier homepage (), by selecting “Support & Contact” then “Copyright
and Permission” and then “Obtaining Permissions.”
Recognizing the importance of preserving what has been written, Elsevier prints its books on
acid-free paper whenever possible.
Library of Congress Cataloging-in-Publication Data
Application submitted
British Library Cataloguing-in-Publication Data
A catalogue record for this book is available from the British Library.
ISBN: 978-0-7506-8215-2
For information on all Newnes publications
visit our Web site at
07 08 09 10 10 9 8 7 6 5 4 3 2 1
Printed in the United States of America
Working together to grow
libraries in developing countries
| |
Contents
Preface ............................................................................................................ ix
Chapter 1: Computer Security Introduction and Review ........................................ 1
What Is Security? .............................................