Breaking News!
60% Off the Hottest Halloween Costumes & Accessories

Building Secure Firmware

Best Price (Coupon Required):
Buy Building Secure Firmware for $36.00 at @ Link.springer.com when you apply the 10% OFF coupon at checkout.
Click “Get Coupon & Buy” to copy the code and unlock the deal.

Set a price drop alert to never miss an offer.

1 Offer Price Range: $39.99 - $39.99
BEST PRICE

Single Product Purchase

$36.00
@ Link.springer.com with extra coupon

Price Comparison

Seller Contact Seller List Price On Sale Shipping Best Promo Final Price Volume Discount Financing Availability Seller's Page
BEST PRICE
1 Product Purchase
@ Link.springer.com
$39.99 $39.99

10% OFF
This deals requires coupon
$36.00
See Site In stock Visit Store

Product Details

Brand
Springer Nature
Manufacturer
N/A
Part Number
0
GTIN
9781484261064
Condition
New
Product Description

Use this book to build secure firmware. As operating systems and hypervisors have become successively more hardened, malware has moved further down the stack and into firmware. Firmware represents the boundary between hardware and software, and given its persistence, mutability, and opaqueness to todays antivirus scanning technology, it represents an interesting target for attackers. As platforms are universally network-connected and can contain multiple devices with firmware, and a global supply chain feeds into platform firmware, assurance is critical for consumers, IT enterprises, and governments. This importance is highlighted by emergent requirements such as NIST SP800-193 for firmware resilience and NIST SP800-155 for firmware measurement. This book covers the secure implementation of various aspects of firmware, including standards-based firmwaresuch as support of the Trusted Computing Group (TCG), Desktop Management Task Force (DMTF), and UnifiedExtensible Firmware Interface (UEFI) specificationsand also provides code samples and use cases. Beyond the standards, alternate firmware implementations such as ARM Trusted Firmware and other device firmware implementations (such as platform roots of trust), are covered. What You Will Learn Get an overview of proactive security development for firmware, including firmware threat modeling Understand the details of architecture, including protection, detection, recovery, integrity measurement, and access control Be familiar with best practices for secure firmware development, including trusted execution environments, cryptography, and language-based defenses Know the techniques used for security validation and maintenance Who This Book Is For Given the complexity of modern platform boot requirements and the threat landscape, this book is relevant for readers spanning from IT decision makers to developers building firmware.

Available Colors
Available Sizes

Reviews

0
0 reviews
5 stars
4 stars
3 stars
2 stars
1 star

Questions & Answers

Similar Products

Protein Phosphatases

Protein Phosphatases

$329.99
Die ergrauende Werbung

Die ergrauende Werbung

$39.99
Endocrine Disorders in Kidney Disease

Endocrine Disorders in Kidney Disease

$99.00
Scale Computation and Information Processing in Air Traffic Control

Scale Computation and Information Processing in Air Traffic Control

$84.99
Managing Creativity in Science and Hi-Tech

Managing Creativity in Science and Hi-Tech

$54.99
Structure and Bonding

Structure and Bonding

$74.99
Muscle Development in Drosophilia

Muscle Development in Drosophilia

$129.00
Semantics, Applications, and Implementation of Program Generation

Semantics, Applications, and Implementation of Program Generation

$39.99
Advances in Research on Neurodegeneration

Advances in Research on Neurodegeneration

$129.00
Pathways and Consequences of Legal Irregularity

Pathways and Consequences of Legal Irregularity

$54.99
Frau  Frauen  Kriminelle

Frau Frauen Kriminelle

$59.99
Chemoarchitecture of the Brain

Chemoarchitecture of the Brain

$139.99
Signal and Information Processing, Networking and Computers

Signal and Information Processing, Networking and Computers

$299.00
Exscalate4CoV

Exscalate4CoV

$54.99
Spatial Network Data

Spatial Network Data

$54.99
The Essential Guide to Flash CS4 AIR Development

The Essential Guide to Flash CS4 AIR Development

$39.99
Deregulation of Electric Utilities

Deregulation of Electric Utilities

$129.00
Management-Informationssysteme

Management-Informationssysteme

$59.99
Polyampholytes

Polyampholytes

$109.99
Water Resources Management and Sustainability

Water Resources Management and Sustainability

$129.00
Arbeitsschutzrecht

Arbeitsschutzrecht

$17.99
Unternehmung und Unvollkommene Information

Unternehmung und Unvollkommene Information

$59.99
Human-Aware Robotics: Modeling Human Motor Skills for the Design, Planning and Control of a New Gene

Human-Aware Robotics: Modeling Human Motor Skills for the Design, Planning and Control of a New Gene

$159.99
Wild About Us!

Wild About Us!

$5.21
Earthquake Precursors in the Atmosphere and Ionosphere

Earthquake Precursors in the Atmosphere and Ionosphere

$159.99
Is God a Scientist?

Is God a Scientist?

$54.99
Triple Play

Triple Play

$59.99
Child Law

Child Law

$84.99
Handbuch zum Testen von Web- und Mobile-Apps

Handbuch zum Testen von Web- und Mobile-Apps

$49.99
Advances in Cryptology  EUROCRYPT 2022

Advances in Cryptology EUROCRYPT 2022

$179.99
Osteonecrosis

Osteonecrosis

$109.00
Grundlagen der Mathematik I

Grundlagen der Mathematik I

$89.99
Neurophysiologische Untersuchungsmethoden in der Intensivmedizin

Neurophysiologische Untersuchungsmethoden in der Intensivmedizin

$44.99
Biscuit Visits the Big City

Biscuit Visits the Big City

$3.71
The Architectural Logic of Database Systems

The Architectural Logic of Database Systems

$54.99
AIDS Policy in Uganda

AIDS Policy in Uganda

$54.99
Einfhrung in die Limnologie

Einfhrung in die Limnologie

$59.99
Databases in Networked Information Systems

Databases in Networked Information Systems

$39.99
The Reoviridae

The Reoviridae

$329.99
De Dialectica

De Dialectica

$119.99
previous
next