The Embedded Linux Security Handbook : Fortify your embedded Linux systems from design to deployment

個数:

The Embedded Linux Security Handbook : Fortify your embedded Linux systems from design to deployment

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 278 p.
  • 言語 ENG
  • 商品コード 9781835885642
  • DDC分類 005.432

Full Description

Written by Linux and open-source expert Matt St. Onge, this definitive guide helps you build and secure Linux-based appliances capable of withstanding the latest cyber threats

All formats include a free PDF and an invitation to the Embedded System Professionals community

Key Features

Develop secure, user-friendly interfaces with streamlined configuration, updates, and life cycle support
Learn how to integrate popular security techniques for embedded Linux into the development process
Integrate advanced hardware with software security features to enhance your solution's resilience
Purchase of the print or Kindle book includes a free PDF eBook

Book DescriptionAs embedded Linux systems power countless devices in our daily lives, they've become prime targets for cyberattacks. In this in-depth guide to safeguarding your Linux devices, the author leverages his 30+ years of technology experience to help you mitigate the risks associated with hardware and software vulnerabilities.
This book introduces you to the world of embedded systems, the brains behind your everyday appliances. It takes you through the different types of embedded systems, their uses, and the platforms they run on, while addressing their unique security challenges and support considerations. You'll learn how to build a successful, secure, and user-friendly solution by exploring the critical hardware and software components that form the foundation of a secure appliance. We won't forget the human element either; you'll find out how to configure your system to prevent user errors and maintain its integrity. The book lets you put your newfound knowledge into action, guiding you through designing a robust build chain that supports the entire life cycle of your appliance solution, enabling seamless updates without your direct involvement.
By the end of this book, you'll be able to adapt your appliance to the ever-evolving threat landscape, ensuring its continued security and functionality in real-world conditions.What you will learn

Understand how to determine the optimal hardware platform based on design criteria
Recognize the importance of security by design in embedded systems
Implement advanced security measures such as TPM, LUKS encryption, and Secure Boot processes
Discover best practices for secure life cycle management, including appliance update and upgrade mechanisms
Create a secure software supply chain efficiently
Implement childproofing by controlling access and resources on the appliance

Who this book is forThis book helps embedded systems professionals, embedded software engineers, and Linux security professionals gain the skills needed to address critical security requirements during the design, development, and testing of software for embedded systems. If you're a product manager or architect, this book will teach you how to identify and integrate essential security features based on the specific platforms and their intended users.

Contents

Table of Contents

Welcome to the Cyber Security Landscape
Security Starts at the Design Table
Applying Design Requirements Criteria - Hardware Selection
Applying Design Requirements Criteria - the Operating System
Basic Needs in My Build Chain
Disk Encryption
The Trusted Platform Module
Boot, BIOS, and Firmware Security
Image-Based Deployments
Childproofing the Solution: Protection from the End-User and Their Environment
Knowing the Threat Landscape - Staying Informed
Are My Devices' Communications and Interactions Secure?
Applying Government Security Standards - System Hardening
Customer and Community Feedback Loops

最近チェックした商品