Secure Smart Embedded Devices, Platforms and Applications
Markantonakis, Konstantinos, University of London, Dr. Keith Mayes (Eds.)
2014, XLI, 568 p. 135 illus.
Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.
You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.
After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.
Presents a broad range of cross-industry/discipline topics related to secure embedded systems, with chapters that are authored by experienced industry experts and applicable to real-world problems
Useful as a subject overview and as an in-depth reference, making it suitable for a wide range of readers including researchers, experts and managers from industry and government
Serves as a reminder of technical and practical issues for IT users who still depend on the critical security provided by small embedded systems
New generations of IT users are increasingly abstracted from the underlying devices and platforms that provide and safeguard their services. As a result they may have little awareness that they are critically dependent on the embedded security devices that are becoming pervasive in daily modern life. Secure Smart Embedded Devices, Platforms and Applications provides a broad overview of the many security and practical issues of embedded devices, tokens, and their operation systems, platforms and main applications. It also addresses a diverse range of industry/government initiatives and considerations, while focusing strongly on technical and practical security issues.
The benefits and pitfalls of developing and deploying applications that rely on embedded systems and their security functionality are presented. A sufficient level of technical detail to support embedded systems is provided throughout the text, although the book is quite readable for those seeking awareness through an initial overview of the topics. This edited volume benefits from the contributions of industry and academic experts and helps provide a cross-discipline overview of the security and practical issues for embedded systems, tokens, and platforms. It is an ideal complement to the earlier work, Smart Cards Tokens, Security and Applications from the same editors.
Content Level »Research
Keywords »Applications - Attacks - Automotive - Cryptography - Embedded Systems - GPS - Microprocessors - Mobile Phones - Near field Communications (NFC) - Platforms - Programming - Protocols - Satellite TV set-top-boxes - Security - Smart Cards - Terminals - Wireless Sensor Nodes