購物比價找書網找車網
FindBook  
 有 1 項符合

The Embedded Linux Security Handbook: Fortify your embedded Linux systems from design to deployment

的圖書
The Embedded Linux Security Handbook: Fortify your embedded Linux systems from design to deployment The Embedded Linux Security Handbook: Fortify your embedded Linux systems from design to deployment

作者:St Onge 
出版社:Packt Publishing
出版日期:2025-04-10
語言:英文   規格:平裝 / 278頁 / 23.5 x 19.05 x 1.47 cm / 普通級/ 初版
圖書選購
型式價格供應商所屬目錄
 
$ 2474
博客來 博客來
系統管理
圖書介紹 - 資料來源:博客來   評分:
圖書名稱:The Embedded Linux Security Handbook: Fortify your embedded Linux systems from design to deployment

內容簡介

Written by Linux and open-source expert Matt St. Onge, this definitive guide helps you build and secure Linux-based appliances capable of withstanding the latest cyber threats

All formats include a free PDF and an invitation to the Embedded System Professionals community

Key Features:

- Develop secure, user-friendly interfaces with streamlined configuration, updates, and life cycle support

- Learn how to integrate popular security techniques for embedded Linux into the development process

- Integrate advanced hardware with software security features to enhance your solution’s resilience

- Purchase of the print or Kindle book includes a free PDF eBook

Book Description:

As embedded Linux systems power countless devices in our daily lives, they’ve become prime targets for cyberattacks. In this in-depth guide to safeguarding your Linux devices, the author leverages his 30+ years of technology experience to help you mitigate the risks associated with hardware and software vulnerabilities.

This book introduces you to the world of embedded systems, the brains behind your everyday appliances. It takes you through the different types of embedded systems, their uses, and the platforms they run on, while addressing their unique security challenges and support considerations. You’ll learn how to build a successful, secure, and user-friendly solution by exploring the critical hardware and software components that form the foundation of a secure appliance. We won’t forget the human element either; you’ll find out how to configure your system to prevent user errors and maintain its integrity. The book lets you put your newfound knowledge into action, guiding you through designing a robust build chain that supports the entire life cycle of your appliance solution, enabling seamless updates without your direct involvement.

By the end of this book, you’ll be able to adapt your appliance to the ever-evolving threat landscape, ensuring its continued security and functionality in real-world conditions.

What You Will Learn:

- Understand how to determine the optimal hardware platform based on design criteria

- Recognize the importance of security by design in embedded systems

- Implement advanced security measures such as TPM, LUKS encryption, and Secure Boot processes

- Discover best practices for secure life cycle management, including appliance update and upgrade mechanisms

- Create a secure software supply chain efficiently

- Implement childproofing by controlling access and resources on the appliance

Who this book is for:

This book helps embedded systems professionals, embedded software engineers, and Linux security professionals gain the skills needed to address critical security requirements during the design, development, and testing of software for embedded systems. If you’re a product manager or architect, this book will teach you how to identify and integrate essential security features based on the specific platforms and their intended users.

Table of Contents

- Welcome to the Cyber Security Landscape

- Security Starts at the Design Table

- Applying Design Requirements Criteria - Hardware Selection

- Applying Design Requirements Criteria - the Operating System

- Basic Needs in My Build Chain

- Disk Encryption

- The Trusted Platform Module

- Boot, BIOS, and Firmware Security

- Image-Based Deployments

- Childproofing the Solution: Protection from the End-User and Their Environment

- Knowing the Threat Landscape - Staying Informed

- Are My Devices’ Communications and Interactions Secure?

- Applying Government Security Standards - System Hardening

- Customer and Community Feedback Loops

 

詳細資料

  • ISBN:9781835885642
  • 規格:平裝 / 278頁 / 23.5 x 19.05 x 1.47 cm / 普通級 / 初版
  • 出版地:美國
贊助商廣告
 
 
金石堂 - 暢銷排行榜
明天請和我談戀愛!(08)
作者:山本小鐵子
出版社:尖端漫畫
出版日期:2025-05-23
$ 119 
Taaze 讀冊生活 - 暢銷排行榜
miffy潔膚柔濕巾-10抽(綠)
作者:新台
出版社:新台圖書
出版日期:2023-08-30
$ 15 
Taaze 讀冊生活 - 暢銷排行榜
miffy潔膚柔濕巾-10抽(橘)
作者:新台
出版社:新台圖書
出版日期:2023-08-30
$ 15 
博客來 - 暢銷排行榜
夢想的到就做得到:從零經驗到熱氣球起飛的故事
作者:陳淑慧
出版社:墨刻
出版日期:2025-04-26
$ 337 
 
金石堂 - 新書排行榜
不死之身的忌日(全)
作者:虫歯
出版社:尖端漫畫
出版日期:2025-05-16
$ 119 
博客來 - 新書排行榜
Smoky Nectar—繚繞的蜜液—Renew(全)
出版日期:2025-05-16
$ 119 
博客來 - 新書排行榜
交錯之吻(全)
$ 127 
 

©2025 FindBook.com.tw -  購物比價  找書網  找車網  服務條款  隱私權政策