|Eingestellt in Kategorie:
Ähnlichen Artikel verkaufen?

Sichere Firmware bauen: Das Fundament der Plattform rüsten von Jiewen Yao

AlibrisBooks
(464562)
Angemeldet als gewerblicher Verkäufer
US $49,23
Ca.CHF 39,41
Artikelzustand:
Neu
Ganz entspannt. Rückgaben akzeptiert.
Versand:
Kostenlos Standard Shipping.
Standort: Sparks, Nevada, USA
Lieferung:
Lieferung zwischen Mi, 3. Sep und Di, 9. Sep bei heutigem Zahlungseingang
Liefertermine - wird in neuem Fenster oder Tab geöffnet berücksichtigen die Bearbeitungszeit des Verkäufers, die PLZ des Artikelstandorts und des Zielorts sowie den Annahmezeitpunkt und sind abhängig vom gewählten Versandservice und dem ZahlungseingangZahlungseingang - wird ein neuem Fenster oder Tab geöffnet. Insbesondere während saisonaler Spitzenzeiten können die Lieferzeiten abweichen.
Rücknahme:
30 Tage Rückgabe. Käufer zahlt Rückversand. Wenn Sie ein eBay-Versandetikett verwenden, werden die Kosten dafür von Ihrer Rückerstattung abgezogen.
Zahlungen:
     Diners Club

Sicher einkaufen

eBay-Käuferschutz
Geld zurück, wenn etwas mit diesem Artikel nicht stimmt. Mehr erfahreneBay-Käuferschutz - wird in neuem Fenster oder Tab geöffnet
Der Verkäufer ist für dieses Angebot verantwortlich.
eBay-Artikelnr.:363419007285
Zuletzt aktualisiert am 04. Apr. 2024 14:57:39 MESZAlle Änderungen ansehenAlle Änderungen ansehen

Artikelmerkmale

Artikelzustand
Neu: Neues, ungelesenes, ungebrauchtes Buch in makellosem Zustand ohne fehlende oder beschädigte ...
Book Title
Building Secure Firmware: Armoring the Foundation of the Platform
Publication Date
2020-10-28
Pages
930
ISBN
9781484261057

Über dieses Produkt

Product Identifiers

Publisher
Apress L. P.
ISBN-10
1484261054
ISBN-13
9781484261057
eBay Product ID (ePID)
14050091013

Product Key Features

Number of Pages
Xxx, 930 Pages
Language
English
Publication Name
Building Secure Firmware : Armoring the Foundation of the Platform
Publication Year
2020
Subject
Security / General
Type
Textbook
Author
Vincent Zimmer, Jiewen YAO
Subject Area
Computers
Format
Trade Paperback

Dimensions

Item Weight
63.1 Oz
Item Length
10 in
Item Width
7 in

Additional Product Features

Number of Volumes
1 vol.
Illustrated
Yes
Table Of Content
Part I: Overview.- Chapter 1: Introduction to Firmware.- Chapter 2: Proactive Firmware Security Development.- Part II: Security Architecture.- Chapter 3: Firmware Resilience - Protection.- Chapter 4: Firmware Resilience - Detection.- Chapter 5: Firmware Resilience - Recovery.- Chapter 6: OS Resilience.- Chapter 7: Trusted Boot.- Chapter 8: Device Security.- Chapter 9: S3 Resume.- Chapter 10: Access Control.- Chapter 11: Configuration.- Chapter 12: Security Model.- Chapter 13: Virtual Firmware.- Part III: Security Development.- Chapter 14: General Coding Practice.- Chapter 15: Compiler Defensive Technology.- Chapter 16: The Kernel.- Chapter 17: Trusted Execution Environment.- Chapter 18: Silicon Security Configuration.- Chapter 19: Cryptography.- Chapter 20: Programming Language.- Part IV: Security Test and Maintenance.- Chapter 21: Security Unit Test.- Chapter 22: Security Validation and Penetration.- Chapter 23: Maintenance.
Synopsis
Use this book to build secure firmware. As operating systems and hypervisors have become successively more hardened, malware has moved further down the stack and into firmware. Firmware represents the boundary between hardware and software, and given its persistence, mutability, and opaqueness to today's antivirus scanning technology, it represents an interesting target for attackers. As platforms are universally network-connected and can contain multiple devices with firmware, and a global supply chain feeds into platform firmware, assurance is critical for consumers, IT enterprises, and governments. This importance is highlighted by emergent requirements such as NIST SP800-193 for firmware resilience and NIST SP800-155 for firmware measurement. This book covers the secure implementation of various aspects of firmware, including standards-based firmware--such as support of the Trusted Computing Group (TCG), Desktop Management Task Force (DMTF), and UnifiedExtensible Firmware Interface (UEFI) specifications--and also provides code samples and use cases. Beyond the standards, alternate firmware implementations such as ARM Trusted Firmware and other device firmware implementations (such as platform roots of trust), are covered. What You Will Learn Get an overview of proactive security development for firmware, including firmware threat modeling Understand the details of architecture, including protection, detection, recovery, integrity measurement, and access control Be familiar with best practices for secure firmware development, including trusted execution environments, cryptography, and language-based defenses Know the techniques used for security validation and maintenance Who This Book Is For Given the complexity of modern platform boot requirements and the threat landscape, this book is relevant for readers spanning from IT decision makers to developers building firmware, Use this book to build secure firmware. As operating systems and hypervisors have become successively more hardened, malware has moved further down the stack and into firmware. Firmware represents the boundary between hardware and software, and given its persistence, mutability, and opaqueness to today's antivirus scanning technology, it represents an interesting target for attackers. As platforms are universally network-connected and can contain multiple devices with firmware, and a global supply chain feeds into platform firmware, assurance is critical for consumers, IT enterprises, and governments. This importance is highlighted by emergent requirements such as NIST SP800-193 for firmware resilience and NIST SP800-155 for firmware measurement. This book covers the secure implementation of various aspects of firmware, including standards-based firmware--such as support of the Trusted Computing Group (TCG), Desktop Management Task Force (DMTF), and Unified Extensible Firmware Interface (UEFI) specifications--and also provides code samples and use cases. Beyond the standards, alternate firmware implementations such as ARM Trusted Firmware and other device firmware implementations (such as platform roots of trust), are covered. What You Will Learn Get an overview of proactive security development for firmware, including firmware threat modeling Understand the details of architecture, including protection, detection, recovery, integrity measurement, and access control Be familiar with best practices for secure firmware development, including trusted execution environments, cryptography, and language-based defenses Know the techniques used for security validation and maintenance Who This Book Is For Given the complexity of modern platform boot requirements and the threat landscape, this book is relevant for readers spanning from IT decision makers to developers building firmware
LC Classification Number
QA76.9.A25

Artikelbeschreibung des Verkäufers

Info zu diesem Verkäufer

AlibrisBooks

98,6% positive Bewertungen2.0 Mio. Artikel verkauft

Mitglied seit Mai 2008
Antwortet meist innerhalb 24 Stunden
Angemeldet als gewerblicher Verkäufer
Alibris is the premier online marketplace for independent sellers of new & used books, as well as rare & collectible titles. We connect people who love books to thousands of independent sellers around ...
Mehr anzeigen
Shop besuchenKontakt

Detaillierte Verkäuferbewertungen

Durchschnitt in den letzten 12 Monaten
Genaue Beschreibung
4.9
Angemessene Versandkosten
5.0
Lieferzeit
5.0
Kommunikation
5.0

Verkäuferbewertungen (516'954)

Alle Bewertungen
Positiv
Neutral
Negativ