Sprache: Englisch
Verlag: Morgan & Claypool Publishers, 2013
ISBN 10: 1627052518 ISBN 13: 9781627052511
Anbieter: suffolkbooks, Center moriches, NY, USA
paperback. Zustand: Very Good. Fast Shipping - Safe and Secure 7 days a week!
Anbieter: WeBuyBooks, Rossendale, LANCS, Vereinigtes Königreich
EUR 25,49
Anzahl: 1 verfügbar
In den WarenkorbZustand: Very Good. Most items will be dispatched the same or the next working day. A copy that has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged.
Anbieter: BookOrders, Russell, IA, USA
Soft Cover. Zustand: Good. Ex-library with the usual features. Library label on front cover. The interior is clean and tight. Binding is good. Cover shows very light wear. Ex-Library.
Sprache: Englisch
Verlag: Springer International Publishing AG, Cham, 2013
ISBN 10: 3031012100 ISBN 13: 9783031012105
Anbieter: Grand Eagle Retail, Bensenville, IL, USA
Paperback. Zustand: new. Paperback. In our digital world, integrated circuits are present in nearly every moment of our daily life. Even when using the coffee machine in the morning, or driving our car to work, we interact with integrated circuits. The increasing spread of information technology in virtually all areas of life in the industrialized world offers a broad range of attack vectors. So far, mainly software-based attacks have been considered and investigated, while hardware-based attacks have attracted comparatively little interest. The design and production process of integrated circuits is mostly decentralized due to financial and logistical reasons. Therefore, a high level of trust has to be established between the parties involved in the hardware development lifecycle. During the complex production chain, malicious attackers can insert non-specified functionality by exploiting untrusted processes and backdoors. This work deals with the ways in which such hidden, non-specified functionality can be introducedinto hardware systems. After briefly outlining the development and production process of hardware systems, we systematically describe a new type of threat, the hardware Trojan. We provide a historical overview of the development of research activities in this field to show the growing interest of international research in this topic. Current work is considered in more detail. We discuss the components that make up a hardware Trojan as well as the parameters that are relevant for an attack. Furthermore, we describe current approaches for detecting, localizing, and avoiding hardware Trojans to combat them effectively. Moreover, this work develops a comprehensive taxonomy of countermeasures and explains in detail how specific problems are solved. In a final step, we provide an overview of related work and offer an outlook on further research in this field. This work deals with the ways in which such hidden, non-specified functionality can be introducedinto hardware systems. After briefly outlining the development and production process of hardware systems, we systematically describe a new type of threat, the hardware Trojan. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Anbieter: Basi6 International, Irving, TX, USA
Zustand: Brand New. New. US edition. Expediting shipping for all USA and Europe orders excluding PO Box. Excellent Customer Service.
Anbieter: Romtrade Corp., STERLING HEIGHTS, MI, USA
Zustand: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
Zustand: As New. Unread book in perfect condition.
Anbieter: SMASS Sellers, IRVING, TX, USA
Zustand: New. Brand New Original US Edition. Customer service! Satisfaction Guaranteed.
paperback. Zustand: Fine.
Anbieter: Books Puddle, New York, NY, USA
Zustand: New. pp. 204.
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
EUR 38,73
Anzahl: 1 verfügbar
In den WarenkorbZustand: New. pp. 204 Illus.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 36,55
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In English.
Anbieter: Biblios, Frankfurt am main, HESSE, Deutschland
Zustand: New. pp. 204.
Anbieter: GreatBookPricesUK, Woodford Green, Vereinigtes Königreich
EUR 36,54
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New.
Anbieter: Books Puddle, New York, NY, USA
Zustand: New. 1st edition NO-PA16APR2015-KAP.
Anbieter: GreatBookPricesUK, Woodford Green, Vereinigtes Königreich
EUR 42,77
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: As New. Unread book in perfect condition.
Zustand: As New. Unread book in perfect condition.
Zustand: As New. Unread book in perfect condition.
Zustand: As New. Unread book in perfect condition.
Verlag: New York, Springer 2005 tables, figures, 2005
Anbieter: Antiquarian Bookshop Klikspaan, Leiden, Niederlande
Erstausgabe
1st ed. - With bibliogr., index. - (Advances in information security). - Hardcover, as new.
Zustand: New.
EUR 55,77
Anzahl: 1 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 103 pages. 9.00x7.50x0.25 inches. In Stock.
Zustand: New.
Zustand: New. pp. 256.
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
EUR 61,81
Anzahl: 3 verfügbar
In den WarenkorbZustand: New. pp. 322.