Practical Embedded Security: Building Secure Resource-Constrained Systems

Stapko,Timothy

Practical Embedded Security: Building Secure Resource-Constrained Systems - Burlington Elsevier 2008 - 280p

Computer Security Introduction and Review Network Communications Protocols and Built in Security Security Protocols and Algorithms The Secure Sockets Layer Embedded Security Wireless Application Layer and Client/Server Protocols Choosing and Optimizing Cryptographic Algorithms for Resource-Constrained Systems Hardware Based Security Conclusion - Miscellaneous Security Issues and the Future of Embedded Applications Security PIC Case Study Rabbit Case Study Appendix - A: Source Listing Index

9780750682152 0.00


Computer Security
Embedded Computer Systems
Network Secuirty

005.8 / STA
© 2025 by NIMA Knowledge Centre, Ahmedabad.
Koha version 24.05