0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • -
Status
Brand

Showing 1 - 1 of 1 matches in All Departments

Security Policy in System-on-Chip Designs - Specification, Implementation and Verification (Hardcover, 1st ed. 2019): Sandip... Security Policy in System-on-Chip Designs - Specification, Implementation and Verification (Hardcover, 1st ed. 2019)
Sandip Ray, Abhishek Basak, Swarup Bhunia
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book offers readers comprehensive coverage of security policy specification using new policy languages, implementation of security policies in Systems-on-Chip (SoC) designs - current industrial practice, as well as emerging approaches to architecting SoC security policies and security policy verification. The authors focus on a promising security architecture for implementing security policies, which satisfies the goals of flexibility, verification, and upgradability from the ground up, including a plug-and-play hardware block in which all policy implementations are enclosed. Using this architecture, they discuss the ramifications of designing SoC security policies, including effects on non-functional properties (power/performance), debug, validation, and upgrade. The authors also describe a systematic approach for "hardware patching", i.e., upgrading hardware implementations of security requirements safely, reliably, and securely in the field, meeting a critical need for diverse Internet of Things (IoT) devices. Provides comprehensive coverage of SoC security requirements, security policies, languages, and security architecture for current and emerging computing devices; Explodes myths and ambiguities in SoC security policy implementations, and provide a rigorous treatment of the subject; Demonstrates a rigorous, step-by-step approach to developing a diversity of SoC security policies; Introduces a rigorous, disciplined approach to "hardware patching", i.e., secure technique for updating hardware functionality of computing devices in-field; Includes discussion of current and emerging approaches for security policy verification.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Memory and Imagination in Film…
P. Lombardo Hardcover R2,444 R1,841 Discovery Miles 18 410
Haunted Providence - Strange Tales from…
Rory Raven Paperback R492 R458 Discovery Miles 4 580
The Milos Forman Stories (Routledge…
Antonin J. Liehm Hardcover R4,212 Discovery Miles 42 120
Circular Dichroism and the…
G.D. Fasman Hardcover R9,339 Discovery Miles 93 390
We Who Wrestle With God - Perceptions Of…
Jordan B. Peterson Hardcover R839 R702 Discovery Miles 7 020
Atomic and Nuclear Analytical Methods…
Hem Raj Verma Hardcover R6,997 Discovery Miles 69 970
Bonhoeffer Legacy - Australasian Journal…
Terence Lovat Hardcover R1,090 Discovery Miles 10 900
Reported Speech in Chinese and English…
Wang Jingping Paperback R1,245 Discovery Miles 12 450
Via Afrika isiNdebele Mathematics Grade…
Paperback R270 Discovery Miles 2 700
John Calvin's American Legacy
Thomas Davis Hardcover R1,752 Discovery Miles 17 520

 

Partners