Embedded Linux Security Handbook
portes grátis
Embedded Linux Security Handbook
Fortify your embedded Linux systems from design to deployment
Onge, Matthew David St.
Packt Publishing Limited
01/2025
Mole
9781835885642
Pré-lançamento - envio 15 a 20 dias após a sua edição
Descrição não disponível.
Table of Contents
Welcome to the Cyber Security Landscape
Security Starts at the Design Table
Applying Design Requirements Criteria - Hardware Selection
Applying Design Requirements Criteria - The Operating System
Basic Needs in my Build Chain
Trusted Platform Module
Disk Encryption
Boot, BIOS, and Firmware Security
RPM-OSTREE and the Immutable Operating System
Child-proofing the solution - protecting the device from the End-User & their environment
Knowing the threat landscape - staying informed
Are my devices' communications and interactions secure?
Applying Government Security Standards - Systems Hardening
Customer & Community feedback loops help keep your solution secure
Welcome to the Cyber Security Landscape
Security Starts at the Design Table
Applying Design Requirements Criteria - Hardware Selection
Applying Design Requirements Criteria - The Operating System
Basic Needs in my Build Chain
Trusted Platform Module
Disk Encryption
Boot, BIOS, and Firmware Security
RPM-OSTREE and the Immutable Operating System
Child-proofing the solution - protecting the device from the End-User & their environment
Knowing the threat landscape - staying informed
Are my devices' communications and interactions secure?
Applying Government Security Standards - Systems Hardening
Customer & Community feedback loops help keep your solution secure
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Table of Contents
Welcome to the Cyber Security Landscape
Security Starts at the Design Table
Applying Design Requirements Criteria - Hardware Selection
Applying Design Requirements Criteria - The Operating System
Basic Needs in my Build Chain
Trusted Platform Module
Disk Encryption
Boot, BIOS, and Firmware Security
RPM-OSTREE and the Immutable Operating System
Child-proofing the solution - protecting the device from the End-User & their environment
Knowing the threat landscape - staying informed
Are my devices' communications and interactions secure?
Applying Government Security Standards - Systems Hardening
Customer & Community feedback loops help keep your solution secure
Welcome to the Cyber Security Landscape
Security Starts at the Design Table
Applying Design Requirements Criteria - Hardware Selection
Applying Design Requirements Criteria - The Operating System
Basic Needs in my Build Chain
Trusted Platform Module
Disk Encryption
Boot, BIOS, and Firmware Security
RPM-OSTREE and the Immutable Operating System
Child-proofing the solution - protecting the device from the End-User & their environment
Knowing the threat landscape - staying informed
Are my devices' communications and interactions secure?
Applying Government Security Standards - Systems Hardening
Customer & Community feedback loops help keep your solution secure
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.