0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • -
Status
Brand

Showing 1 - 1 of 1 matches in All Departments

Security Policy in System-on-Chip Designs - Specification, Implementation and Verification (Hardcover, 1st ed. 2019): Sandip... Security Policy in System-on-Chip Designs - Specification, Implementation and Verification (Hardcover, 1st ed. 2019)
Sandip Ray, Abhishek Basak, Swarup Bhunia
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This book offers readers comprehensive coverage of security policy specification using new policy languages, implementation of security policies in Systems-on-Chip (SoC) designs - current industrial practice, as well as emerging approaches to architecting SoC security policies and security policy verification. The authors focus on a promising security architecture for implementing security policies, which satisfies the goals of flexibility, verification, and upgradability from the ground up, including a plug-and-play hardware block in which all policy implementations are enclosed. Using this architecture, they discuss the ramifications of designing SoC security policies, including effects on non-functional properties (power/performance), debug, validation, and upgrade. The authors also describe a systematic approach for "hardware patching", i.e., upgrading hardware implementations of security requirements safely, reliably, and securely in the field, meeting a critical need for diverse Internet of Things (IoT) devices. Provides comprehensive coverage of SoC security requirements, security policies, languages, and security architecture for current and emerging computing devices; Explodes myths and ambiguities in SoC security policy implementations, and provide a rigorous treatment of the subject; Demonstrates a rigorous, step-by-step approach to developing a diversity of SoC security policies; Introduces a rigorous, disciplined approach to "hardware patching", i.e., secure technique for updating hardware functionality of computing devices in-field; Includes discussion of current and emerging approaches for security policy verification.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Wrestling with Life - Stories of My Life…
Phil Nowick Hardcover R505 Discovery Miles 5 050
Teacher Education Policy in China…
Eryong Xue, Jian Li Hardcover R3,611 Discovery Miles 36 110
WWF and AOL - A Collection Of 90s Online…
Anthony Davies Paperback R322 Discovery Miles 3 220
The Portrait Photographer's Manual
Cian Oba-Smith, Max Ferguson Paperback R565 R500 Discovery Miles 5 000
Optimal Trajectory Planning and Train…
Yihui Wang, Bin Ning, … Hardcover R3,786 R3,504 Discovery Miles 35 040
Portrait; v. 7 1915-1916
Ansco Company Hardcover R927 Discovery Miles 9 270
Southern Good Roads; 1911
Henry B Varner Hardcover R941 Discovery Miles 9 410
Killing Karoline - A Memoir
Sara-Jayne King Paperback  (1)
R325 R305 Discovery Miles 3 050
Knowing Emotions - Truthfulness and…
Rick Anthony Furtak Paperback R1,365 Discovery Miles 13 650
Handbook of Research on Empowering Early…
Jade Burris, Dina Rosen, … Hardcover R7,211 Discovery Miles 72 110

 

Partners