Practical Embedded Security: Building Secure Resource-Constrained Systems
Stapko,Timothy
Practical Embedded Security: Building Secure Resource-Constrained Systems - Burlington Elsevier 2008 - 280p
Computer Security Introduction and Review Network Communications Protocols and Built in Security Security Protocols and Algorithms The Secure Sockets Layer Embedded Security Wireless Application Layer and Client/Server Protocols Choosing and Optimizing Cryptographic Algorithms for Resource-Constrained Systems Hardware Based Security Conclusion - Miscellaneous Security Issues and the Future of Embedded Applications Security PIC Case Study Rabbit Case Study Appendix - A: Source Listing Index
9780750682152 0.00
Computer Security
Embedded Computer Systems
Network Secuirty
005.8 / STA
Practical Embedded Security: Building Secure Resource-Constrained Systems - Burlington Elsevier 2008 - 280p
Computer Security Introduction and Review Network Communications Protocols and Built in Security Security Protocols and Algorithms The Secure Sockets Layer Embedded Security Wireless Application Layer and Client/Server Protocols Choosing and Optimizing Cryptographic Algorithms for Resource-Constrained Systems Hardware Based Security Conclusion - Miscellaneous Security Issues and the Future of Embedded Applications Security PIC Case Study Rabbit Case Study Appendix - A: Source Listing Index
9780750682152 0.00
Computer Security
Embedded Computer Systems
Network Secuirty
005.8 / STA