Security in embedded devices /
Saved in:
Author / Creator: | Gebotys, Catherine H. |
---|---|
Imprint: | New York ; London : Springer, c2010. |
Description: | 1 online resource (xi, 297 p.) : ill. |
Language: | English |
Series: | Embedded systems Embedded systems (Springer (Firm)) |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/8894078 |
MARC
LEADER | 00000cam a2200000Ia 4500 | ||
---|---|---|---|
001 | 8894078 | ||
003 | ICU | ||
005 | 20120829133300.0 | ||
006 | m d | ||
007 | cr cn| | ||
008 | 100909s2010 nyua ob 001 0 eng d | ||
019 | |a 605757201 |a 647833581 |a 705930005 | ||
020 | |a 9781441915306 | ||
020 | |a 1441915303 | ||
020 | |a 144191529X | ||
020 | |a 9781441915290 | ||
035 | |a (OCoLC)663096377 |z (OCoLC)605757201 |z (OCoLC)647833581 |z (OCoLC)705930005 | ||
037 | |a 978-1-4419-1529-0 |b Springer |n http://www.springerlink.com | ||
040 | |a GW5XE |b eng |c GW5XE |d EBLCP |d CDX |d HNK |d UBF |d E7B |d N$T |d OCLCQ |d MHW |d OCLCQ |d YDXCP |d B24X7 | ||
049 | |a CGUA | ||
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 0 | 4 | |a 005.8 |2 22 |
090 | |a TK7895.E42 |b G43 2010 | ||
100 | 1 | |a Gebotys, Catherine H. |0 http://id.loc.gov/authorities/names/n91081581 |1 http://viaf.org/viaf/26244294 | |
245 | 1 | 0 | |a Security in embedded devices / |c Catherine H. Gebotys. |
260 | |a New York ; |a London : |b Springer, |c c2010. | ||
300 | |a 1 online resource (xi, 297 p.) : |b ill. | ||
336 | |a text |b txt |2 rdacontent |0 http://id.loc.gov/vocabulary/contentTypes/txt | ||
337 | |a computer |b c |2 rdamedia |0 http://id.loc.gov/vocabulary/mediaTypes/c | ||
338 | |a online resource |b cr |2 rdacarrier |0 http://id.loc.gov/vocabulary/carriers/cr | ||
490 | 1 | |a Embedded systems | |
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Security in Embedded Devices; Preface; 1 Where Security Began; 2 Introduction to Secure Embedded Systems; 3 The Key; 4 Using Keys; 5 Elliptic Curve Protocols; 6 Symmetric Key Protocols Including Ciphers; 7 Data Integrity and Message Authentication; 8 Side Channel Attacks on the Embedded System; 9 Countermeasures; 10 Reliable Testable Secure Systems; 11 Summary, Standards, and Ongoing Efforts; Index. | |
588 | |a Description based on print version record. | ||
650 | 0 | |a Embedded computer systems |x Security measures. | |
650 | 0 | |a Computer security. |0 http://id.loc.gov/authorities/subjects/sh90001862 | |
650 | 4 | |a Computer Science |x IT. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
655 | 4 | |a Electronic books. | |
650 | 7 | |a Computer security. |2 fast |0 http://id.worldcat.org/fast/fst00872484 | |
776 | 0 | 8 | |i Print version: |a Gebotys, Catherine H. |t Security in embedded devices. |d New York ; London : Springer, c2010 |z 9781441915290 |z 144191529X |w (DLC) 2009939496 |w (OCoLC)436030993 |
830 | 0 | |a Embedded systems (Springer (Firm)) |0 http://id.loc.gov/authorities/names/no2010039832 | |
856 | 4 | 0 | |u http://dx.doi.org/10.1007/978-1-4419-1530-6 |y SpringerLink |
903 | |a HeVa | ||
035 | |a (ICU)8894078 | ||
929 | |a eresource | ||
999 | f | f | |i 7f0c82cc-b4e0-53f0-9bd3-48fb8b5f0518 |s 1ee38e76-3e3e-532f-b2e6-b7a0dac81fa5 |
928 | |t Library of Congress classification |a TK7895.E42 G43 2010 |l Online |c UC-FullText |u http://dx.doi.org/10.1007/978-1-4419-1530-6 |z SpringerLink |g ebooks |i 11477293 |