Bild 1 von 1

Galerie
Bild 1 von 1

Sichere Firmware bauen: Das Fundament der Plattform rüsten von Jiewen Yao-
US $49,23
Ca.EUR 42,01
Artikelzustand:
Neu
Neues, ungelesenes, ungebrauchtes Buch in makellosem Zustand ohne fehlende oder beschädigte Seiten. Genauere Einzelheiten entnehmen Sie bitte dem Angebot des Verkäufers.
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Versand:
Kostenlos Standard Shipping.
Standort: Sparks, Nevada, USA
Lieferung:
Lieferung zwischen Do, 28. Aug und Do, 4. Sep nach 94104 bei heutigem Zahlungseingang
Rücknahme:
30 Tage Rückgabe. Käufer zahlt Rückversand. Wenn Sie ein eBay-Versandetikett verwenden, werden die Kosten dafür von Ihrer Rückerstattung abgezogen.
Zahlungen:
Sicher einkaufen
- Gratis Rückversand im Inland
- Punkte für jeden Kauf und Verkauf
- Exklusive Plus-Deals
Der Verkäufer ist für dieses Angebot verantwortlich.
eBay-Artikelnr.:363419007285
Artikelmerkmale
- Artikelzustand
- Book Title
- Building Secure Firmware: Armoring the Foundation of the Platform
- Publication Date
- 2020-10-28
- Pages
- 930
- ISBN
- 9781484261057
Über dieses Produkt
Product Identifiers
Publisher
Apress L. P.
ISBN-10
1484261054
ISBN-13
9781484261057
eBay Product ID (ePID)
14050091013
Product Key Features
Number of Pages
Xxx, 930 Pages
Language
English
Publication Name
Building Secure Firmware : Armoring the Foundation of the Platform
Publication Year
2020
Subject
Security / General
Type
Textbook
Subject Area
Computers
Format
Trade Paperback
Dimensions
Item Weight
63.1 Oz
Item Length
10 in
Item Width
7 in
Additional Product Features
Number of Volumes
1 vol.
Illustrated
Yes
Table Of Content
Part I: Overview.- Chapter 1: Introduction to Firmware.- Chapter 2: Proactive Firmware Security Development.- Part II: Security Architecture.- Chapter 3: Firmware Resilience - Protection.- Chapter 4: Firmware Resilience - Detection.- Chapter 5: Firmware Resilience - Recovery.- Chapter 6: OS Resilience.- Chapter 7: Trusted Boot.- Chapter 8: Device Security.- Chapter 9: S3 Resume.- Chapter 10: Access Control.- Chapter 11: Configuration.- Chapter 12: Security Model.- Chapter 13: Virtual Firmware.- Part III: Security Development.- Chapter 14: General Coding Practice.- Chapter 15: Compiler Defensive Technology.- Chapter 16: The Kernel.- Chapter 17: Trusted Execution Environment.- Chapter 18: Silicon Security Configuration.- Chapter 19: Cryptography.- Chapter 20: Programming Language.- Part IV: Security Test and Maintenance.- Chapter 21: Security Unit Test.- Chapter 22: Security Validation and Penetration.- Chapter 23: Maintenance.
Synopsis
Use this book to build secure firmware. As operating systems and hypervisors have become successively more hardened, malware has moved further down the stack and into firmware. Firmware represents the boundary between hardware and software, and given its persistence, mutability, and opaqueness to today's antivirus scanning technology, it represents an interesting target for attackers. As platforms are universally network-connected and can contain multiple devices with firmware, and a global supply chain feeds into platform firmware, assurance is critical for consumers, IT enterprises, and governments. This importance is highlighted by emergent requirements such as NIST SP800-193 for firmware resilience and NIST SP800-155 for firmware measurement. This book covers the secure implementation of various aspects of firmware, including standards-based firmware--such as support of the Trusted Computing Group (TCG), Desktop Management Task Force (DMTF), and UnifiedExtensible Firmware Interface (UEFI) specifications--and also provides code samples and use cases. Beyond the standards, alternate firmware implementations such as ARM Trusted Firmware and other device firmware implementations (such as platform roots of trust), are covered. What You Will Learn Get an overview of proactive security development for firmware, including firmware threat modeling Understand the details of architecture, including protection, detection, recovery, integrity measurement, and access control Be familiar with best practices for secure firmware development, including trusted execution environments, cryptography, and language-based defenses Know the techniques used for security validation and maintenance Who This Book Is For Given the complexity of modern platform boot requirements and the threat landscape, this book is relevant for readers spanning from IT decision makers to developers building firmware, Use this book to build secure firmware. As operating systems and hypervisors have become successively more hardened, malware has moved further down the stack and into firmware. Firmware represents the boundary between hardware and software, and given its persistence, mutability, and opaqueness to today's antivirus scanning technology, it represents an interesting target for attackers. As platforms are universally network-connected and can contain multiple devices with firmware, and a global supply chain feeds into platform firmware, assurance is critical for consumers, IT enterprises, and governments. This importance is highlighted by emergent requirements such as NIST SP800-193 for firmware resilience and NIST SP800-155 for firmware measurement. This book covers the secure implementation of various aspects of firmware, including standards-based firmware--such as support of the Trusted Computing Group (TCG), Desktop Management Task Force (DMTF), and Unified Extensible Firmware Interface (UEFI) specifications--and also provides code samples and use cases. Beyond the standards, alternate firmware implementations such as ARM Trusted Firmware and other device firmware implementations (such as platform roots of trust), are covered. What You Will Learn Get an overview of proactive security development for firmware, including firmware threat modeling Understand the details of architecture, including protection, detection, recovery, integrity measurement, and access control Be familiar with best practices for secure firmware development, including trusted execution environments, cryptography, and language-based defenses Know the techniques used for security validation and maintenance Who This Book Is For Given the complexity of modern platform boot requirements and the threat landscape, this book is relevant for readers spanning from IT decision makers to developers building firmware
LC Classification Number
QA76.9.A25
Artikelbeschreibung des Verkäufers
Rechtliche Informationen des Verkäufers
Info zu diesem Verkäufer
AlibrisBooks
98,6% positive Bewertungen•2,0 Mio. Artikel verkauft
Angemeldet als gewerblicher Verkäufer
Verkäuferbewertungen (516.399)
- m***m (2315)- Bewertung vom Käufer.Letzte 6 MonateBestätigter KaufI’m thrilled with my recent purchase . The website was user-friendly, and the product descriptions were accurate. Customer service was prompt and helpful, answering all my questions. My order arrived quickly, well-packaged, and the product exceeded my expectations in quality. I’m impressed with the attention to detail and the overall experience. I’ll definitely shop here again and highly recommend from this seller to others. Thank you for a fantastic experience!Tobin's Spirit Guide: Official Ghostbusters Edition by Erik Burnham: Used (Nr. 404302598631)
- a***n (54)- Bewertung vom Käufer.Letzte 6 MonateBestätigter KaufMistakenly ordered a paperback that I thought was a hardcover, not sellers fault; it was described properly on the listing. Seller still processed a refund the day I went to return the item and let me keep the item anyway. A+++ service. Book arrived quickly in great condition and for a great price. Thank you so much! Amazing seller!
- n***c (97)- Bewertung vom Käufer.Letzte 6 MonateBestätigter Kaufseller was communicative about my shipment, media mail took a while and tracking wasn't updated frequently, but seller communicated to me very quickly on status. the item came new and wrapped as described, though the packaging in it was packed wasn't sturdy and falling apart when it got to me.Michael Jang: Who Is Michael Jang? by Michael Jang: New (Nr. 401849573576)