Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover image Title page Table of Contents Copyright Preface Chapter 1: Computer Security Introduction and Review
What Is Security? What Can We Do? Access Control and the Origins of Computer Security Theory Security Policies Cryptography Data Integrity and Authentication Wrap-Up Recommended Reading
Chapter 2: Network Communications Protocols and Built-in Security
Low-Level Communications Transport and Internet Layer Protocols Other Network Protocols Wrap-Up: Network Communications
Chapter 3: Security Protocols and Algorithms
Protocol Madness Standardizing Security—A Brief History Standardized Security in Practice Cryptography and Protocols Other Security Protocols
Chapter 4: The Secure Sockets Layer
SSL History Pesky PKI PKI Alternatives SSL Under the Hood The SSL Session SSL in Practice Wrap-Up
Chapter 5: Embedded Security
Networked Embedded Systems and Resource Constraints Embedded Security Design The KISS Principle Modularity Is Key Pick and Pull Justification Wrap-Up
Chapter 6: Wireless
Wireless Technologies Bluetooth ZigBee Wireless Technologies and the Future Wrap-Up
Chapter 7: Application-Layer and Client/Server Protocols
Introduction The World Wide Web Web-Based Interfaces Server-Side HTTP Web Interfaces HTTP Client Web Interfaces Combination Client/Server HTTP Applications Console Applications File Transfer Protocol Email, DNS, DHCP, and SNMP Wrap-Up
Chapter 8: Choosing and Optimizing Cryptographic Algorithms for Resource-Constrained Systems
Do We Need Cryptography? Hashing–Low Security, High Performance To Optimize or Not to Optimize … Choosing Cryptographic Algorithms Tailoring Security for Your Application Wrap-Up
Chapter 9: Hardware-Based Security
High Performance in Silicon Wrap-Up: Security and Hardware
Chapter 10: Conclusion—Miscellaneous Security Issues and the Future of Embedded Applications Security
Programming Languages and Security Dealing with Attacks The Future of Security Wrap-Up
Chapter 11: PIC Case Study
Microchip PIC with Ethernet Controller PIC Example Application—Secure LED Blinking
Chapter 12: Rabbit Case Study
Rabbit 4000 CPU with Dynamic C The History of Rabbit Software on the Rabbit Rabbit Case Study—Internet Enabled Vending Machine Putting It All Together The PC Side Wrap-Up: A Secure Rabbit
Source Listings Index
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion