Bild 1 von 1

Galerie
Bild 1 von 1

Ähnlichen Artikel verkaufen?
Sichere Firmware bauen: Das Fundament der Plattform rüsten von Jiewen Yao
US $49,23
Ca.CHF 39,41
Artikelzustand:
Neu
Neues, ungelesenes, ungebrauchtes Buch in makellosem Zustand ohne fehlende oder beschädigte Seiten. Genauere Einzelheiten entnehmen Sie bitte dem Angebot des Verkäufers.
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Versand:
Kostenlos Standard Shipping.
Standort: Sparks, Nevada, USA
Lieferung:
Lieferung zwischen Mi, 3. Sep und Di, 9. Sep bei heutigem Zahlungseingang
Rücknahme:
30 Tage Rückgabe. Käufer zahlt Rückversand. Wenn Sie ein eBay-Versandetikett verwenden, werden die Kosten dafür von Ihrer Rückerstattung abgezogen.
Zahlungen:
Sicher einkaufen
Der Verkäufer ist für dieses Angebot verantwortlich.
eBay-Artikelnr.:363419007285
Artikelmerkmale
- Artikelzustand
- Book Title
- Building Secure Firmware: Armoring the Foundation of the Platform
- Publication Date
- 2020-10-28
- Pages
- 930
- ISBN
- 9781484261057
Über dieses Produkt
Product Identifiers
Publisher
Apress L. P.
ISBN-10
1484261054
ISBN-13
9781484261057
eBay Product ID (ePID)
14050091013
Product Key Features
Number of Pages
Xxx, 930 Pages
Language
English
Publication Name
Building Secure Firmware : Armoring the Foundation of the Platform
Publication Year
2020
Subject
Security / General
Type
Textbook
Subject Area
Computers
Format
Trade Paperback
Dimensions
Item Weight
63.1 Oz
Item Length
10 in
Item Width
7 in
Additional Product Features
Number of Volumes
1 vol.
Illustrated
Yes
Table Of Content
Part I: Overview.- Chapter 1: Introduction to Firmware.- Chapter 2: Proactive Firmware Security Development.- Part II: Security Architecture.- Chapter 3: Firmware Resilience - Protection.- Chapter 4: Firmware Resilience - Detection.- Chapter 5: Firmware Resilience - Recovery.- Chapter 6: OS Resilience.- Chapter 7: Trusted Boot.- Chapter 8: Device Security.- Chapter 9: S3 Resume.- Chapter 10: Access Control.- Chapter 11: Configuration.- Chapter 12: Security Model.- Chapter 13: Virtual Firmware.- Part III: Security Development.- Chapter 14: General Coding Practice.- Chapter 15: Compiler Defensive Technology.- Chapter 16: The Kernel.- Chapter 17: Trusted Execution Environment.- Chapter 18: Silicon Security Configuration.- Chapter 19: Cryptography.- Chapter 20: Programming Language.- Part IV: Security Test and Maintenance.- Chapter 21: Security Unit Test.- Chapter 22: Security Validation and Penetration.- Chapter 23: Maintenance.
Synopsis
Use this book to build secure firmware. As operating systems and hypervisors have become successively more hardened, malware has moved further down the stack and into firmware. Firmware represents the boundary between hardware and software, and given its persistence, mutability, and opaqueness to today's antivirus scanning technology, it represents an interesting target for attackers. As platforms are universally network-connected and can contain multiple devices with firmware, and a global supply chain feeds into platform firmware, assurance is critical for consumers, IT enterprises, and governments. This importance is highlighted by emergent requirements such as NIST SP800-193 for firmware resilience and NIST SP800-155 for firmware measurement. This book covers the secure implementation of various aspects of firmware, including standards-based firmware--such as support of the Trusted Computing Group (TCG), Desktop Management Task Force (DMTF), and UnifiedExtensible Firmware Interface (UEFI) specifications--and also provides code samples and use cases. Beyond the standards, alternate firmware implementations such as ARM Trusted Firmware and other device firmware implementations (such as platform roots of trust), are covered. What You Will Learn Get an overview of proactive security development for firmware, including firmware threat modeling Understand the details of architecture, including protection, detection, recovery, integrity measurement, and access control Be familiar with best practices for secure firmware development, including trusted execution environments, cryptography, and language-based defenses Know the techniques used for security validation and maintenance Who This Book Is For Given the complexity of modern platform boot requirements and the threat landscape, this book is relevant for readers spanning from IT decision makers to developers building firmware, Use this book to build secure firmware. As operating systems and hypervisors have become successively more hardened, malware has moved further down the stack and into firmware. Firmware represents the boundary between hardware and software, and given its persistence, mutability, and opaqueness to today's antivirus scanning technology, it represents an interesting target for attackers. As platforms are universally network-connected and can contain multiple devices with firmware, and a global supply chain feeds into platform firmware, assurance is critical for consumers, IT enterprises, and governments. This importance is highlighted by emergent requirements such as NIST SP800-193 for firmware resilience and NIST SP800-155 for firmware measurement. This book covers the secure implementation of various aspects of firmware, including standards-based firmware--such as support of the Trusted Computing Group (TCG), Desktop Management Task Force (DMTF), and Unified Extensible Firmware Interface (UEFI) specifications--and also provides code samples and use cases. Beyond the standards, alternate firmware implementations such as ARM Trusted Firmware and other device firmware implementations (such as platform roots of trust), are covered. What You Will Learn Get an overview of proactive security development for firmware, including firmware threat modeling Understand the details of architecture, including protection, detection, recovery, integrity measurement, and access control Be familiar with best practices for secure firmware development, including trusted execution environments, cryptography, and language-based defenses Know the techniques used for security validation and maintenance Who This Book Is For Given the complexity of modern platform boot requirements and the threat landscape, this book is relevant for readers spanning from IT decision makers to developers building firmware
LC Classification Number
QA76.9.A25
Artikelbeschreibung des Verkäufers
Info zu diesem Verkäufer
AlibrisBooks
98,6% positive Bewertungen•2.0 Mio. Artikel verkauft
Angemeldet als gewerblicher Verkäufer
Verkäuferbewertungen (516'954)
- a***s (880)- Bewertung vom Käufer.Letzter MonatBestätigter KaufThe item was a book in great condition. It was a gift and I was happy to see it was of good quality. It will hold it's value and with care it's appearance will always be pleasing.
- y***w (2157)- Bewertung vom Käufer.Letzter MonatBestätigter KaufMemories of childhood!
- e***s (3517)- Bewertung vom Käufer.Letzter MonatBestätigter KaufBook in pristine condition. Fast shipping. A happy repeat buyer. Many thanks.