Security in embedded devices /

Saved in:
Bibliographic Details
Author / Creator:Gebotys, Catherine H.
Imprint:New York ; London : Springer, c2010.
Description:1 online resource (xi, 297 p.) : ill.
Language:English
Series:Embedded systems
Embedded systems (Springer (Firm))
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/8894078
Hidden Bibliographic Details
ISBN:9781441915306
1441915303
144191529X
9781441915290
Notes:Includes bibliographical references and index.
Description based on print version record.
Other form:Print version: Gebotys, Catherine H. Security in embedded devices. New York ; London : Springer, c2010 9781441915290 144191529X

MARC

LEADER 00000cam a2200000Ia 4500
001 8894078
003 ICU
005 20120829133300.0
006 m d
007 cr cn|
008 100909s2010 nyua ob 001 0 eng d
019 |a 605757201  |a 647833581  |a 705930005 
020 |a 9781441915306 
020 |a 1441915303 
020 |a 144191529X 
020 |a 9781441915290 
035 |a (OCoLC)663096377  |z (OCoLC)605757201  |z (OCoLC)647833581  |z (OCoLC)705930005 
037 |a 978-1-4419-1529-0  |b Springer  |n http://www.springerlink.com 
040 |a GW5XE  |b eng  |c GW5XE  |d EBLCP  |d CDX  |d HNK  |d UBF  |d E7B  |d N$T  |d OCLCQ  |d MHW  |d OCLCQ  |d YDXCP  |d B24X7 
049 |a CGUA 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
090 |a TK7895.E42  |b G43 2010 
100 1 |a Gebotys, Catherine H.  |0 http://id.loc.gov/authorities/names/n91081581  |1 http://viaf.org/viaf/26244294 
245 1 0 |a Security in embedded devices /  |c Catherine H. Gebotys. 
260 |a New York ;  |a London :  |b Springer,  |c c2010. 
300 |a 1 online resource (xi, 297 p.) :  |b ill. 
336 |a text  |b txt  |2 rdacontent  |0 http://id.loc.gov/vocabulary/contentTypes/txt 
337 |a computer  |b c  |2 rdamedia  |0 http://id.loc.gov/vocabulary/mediaTypes/c 
338 |a online resource  |b cr  |2 rdacarrier  |0 http://id.loc.gov/vocabulary/carriers/cr 
490 1 |a Embedded systems 
504 |a Includes bibliographical references and index. 
505 0 |a Security in Embedded Devices; Preface; 1 Where Security Began; 2 Introduction to Secure Embedded Systems; 3 The Key; 4 Using Keys; 5 Elliptic Curve Protocols; 6 Symmetric Key Protocols Including Ciphers; 7 Data Integrity and Message Authentication; 8 Side Channel Attacks on the Embedded System; 9 Countermeasures; 10 Reliable Testable Secure Systems; 11 Summary, Standards, and Ongoing Efforts; Index. 
588 |a Description based on print version record. 
650 0 |a Embedded computer systems  |x Security measures. 
650 0 |a Computer security.  |0 http://id.loc.gov/authorities/subjects/sh90001862 
650 4 |a Computer Science  |x IT. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
655 4 |a Electronic books. 
650 7 |a Computer security.  |2 fast  |0 http://id.worldcat.org/fast/fst00872484 
776 0 8 |i Print version:  |a Gebotys, Catherine H.  |t Security in embedded devices.  |d New York ; London : Springer, c2010  |z 9781441915290  |z 144191529X  |w (DLC) 2009939496  |w (OCoLC)436030993 
830 0 |a Embedded systems (Springer (Firm))  |0 http://id.loc.gov/authorities/names/no2010039832 
856 4 0 |u http://dx.doi.org/10.1007/978-1-4419-1530-6  |y SpringerLink 
903 |a HeVa 
035 |a (ICU)8894078 
929 |a eresource 
999 f f |i 7f0c82cc-b4e0-53f0-9bd3-48fb8b5f0518  |s 1ee38e76-3e3e-532f-b2e6-b7a0dac81fa5 
928 |t Library of Congress classification  |a TK7895.E42 G43 2010  |l Online  |c UC-FullText  |u http://dx.doi.org/10.1007/978-1-4419-1530-6  |z SpringerLink  |g ebooks  |i 11477293