Select your rental length

Starts: Today
Ends:

Rent From: $22.83

Deliver to your Kindle or other device

Enter a promotion code
or gift card
 
 
 

Try it free

Sample the beginning of this book for free

Deliver to your Kindle or other device

Anybody can read Kindle books—even without a Kindle device—with the FREE Kindle app for smartphones, tablets and computers.
Sorry, this item is not available in
Image not available for
Color:
Image not available

To view this video download Flash Player

 

Embedded Systems Security: Practical Methods for Safe and Secure Software and Systems Development [Kindle Edition]

David Kleidermacher , Mike Kleidermacher
4.3 out of 5 stars  See all reviews (7 customer reviews)

Digital List Price: $64.95 What's this?
Print List Price: $64.95
Rent From: $22.83 or Buy Price: $47.16
Save up to: $42.12 (65%) You Save: $17.79 (27%)

  • Print ISBN-10: 0123868866
  • Print ISBN-13: 978-0123868862
  • Edition: 1

Formats

Amazon Price New from Used from
Kindle Edition
Rent from
$47.16
$22.83
 
Paperback $49.64  
Shop the new tech.book(store)
New! Introducing the tech.book(store), a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now

Book Description

The ultimate resource for making embedded systems reliable, safe, and secure

Embedded Systems Security provides:

  • A broad understanding of security principles, concerns, and technologies
  • Proven techniques for the efficient development of safe and secure embedded software
  • A study of the system architectures, operating systems and hypervisors, networking, storage, and cryptographic issues that must be considered when designing secure embedded systems
  • Nuggets of practical advice and numerous case studies throughout

Written by leading authorities in the field with 65 years of embedded security experience: one of the original developers of the world’s only Common Criteria EAL 6+ security certified software product and a lead designer of NSA certified cryptographic systems.

This book is indispensable for embedded systems and security professionals, new and experienced.

An important contribution to the understanding of the security of embedded systems. The Kleidermachers are experts in their field. As the Internet of things becomes reality, this book helps business and technology management as well as engineers understand the importance of "security from scratch." This book, with its examples and key points, can help bring more secure, robust systems to the market.

  • Dr. Joerg Borchert, Vice President, Chip Card & Security, Infineon Technologies North America Corp.; President and Chairman, Trusted Computing Group

Embedded Systems Security provides real-world examples of risk and exploitation; most importantly the book offers clear insight into methods used to counter vulnerabilities to build true, native security into technology.

  • Adriel Desautels, President and CTO, Netragard, LLC.

Security of embedded systems is more important than ever. The growth in networking is just one reason. However, many embedded systems developers have insufficient knowledge of how to achieve security in their systems. David Kleidermacher, a world-renowned expert in this field, shares in this book his knowledge and long experience with other engineers. A very important book at the right time.

  • Prof. Dr.-Ing. Matthias Sturm, Leipzig University of Applied Sciences; Chairman, Embedded World Conference steering board


  • Gain an understanding of the operating systems, microprocessors, and network security critical issues that must be considered when designing secure embedded systems
  • Contains nuggets of practical and simple advice on critical issues highlighted throughout the text
  • Short and to –the- point real case studies included to demonstrate embedded systems security in practice


Editorial Reviews

Review

"The illustrations are a very strong part of this book. They are well conceived, always to the point, and in color. One interesting editorial feature is the so-called 'Key Points,' boxes that interrupt the text with a framed statement emphasizing a single important aspect. In addition, the book has very good bibliographical notes, which are extremely rare in this type of publication. Each chapter is followed by an extensive list of relevant citations, often with accompanying explanations.Overall, the book is very enlightening and engineers can learn a lot from it."--Computing Reviews.com, December 28, 2012 "Embedded Systems Security provides real-world examples of risk and exploitation; most importantly the book offers clear insight into methods used to counter vulnerabilities to build true, native security into technology."--Adriel Desautels, President and CTO, Netragard, LLC "Written by leading authorities on security in embedded systems (a lead designer of an NSA certified cryptographic system and a lead developer on the single highest rated software product in the Common Criteria security certification rating system), this book provides an overview of security principles, vulnerability concerns and applicable technologies. Real world examples of system weakness and exploitation illustrate the need for security in development and give practical advice for effective techniques to counteract threats. Areas addressed include data protection protocols, emerging embedded systems, networking, cryptography, system architecture, hypervisors, operating systems and storage."--Reference and Research Book News, August 2012, page 186

From the Back Cover

The ultimate resource for making embedded systems reliable, safe, and secure

Embedded Systems Security provides:

  • A broad understanding of security principles, concerns, and technologies
  • Proven techniques for the efficient development of safe and secure embedded software
  • A study of the system architectures, operating systems and hypervisors, networking, storage, and cryptographic issues that must be considered when designing secure embedded systems
  • Nuggets of practical advice and numerous case studies throughout

Written by leading authorities in the field with 65 years of embedded security experience: one of the original developers of the world's only Common Criteria EAL 6+ security certified software product and a lead designer of NSA certified cryptographic systems.

This book is indispensable for embedded systems and security professionals, new and experienced.

An important contribution to the understanding of the security of embedded systems. The Kleidermachers are experts in their field. As the Internet of things becomes reality, this book helps business and technology management as well as engineers understand the importance of "security from scratch." This book, with its examples and key points, can help bring more secure, robust systems to the market.

  • Dr. Joerg Borchert, Vice President, Chip Card & Security, Infineon Technologies North America Corp.; President and Chairman, Trusted Computing Group

Embedded Systems Security provides real-world examples of risk and exploitation; most importantly the book offers clear insight into methods used to counter vulnerabilities to build true, native security into technology.

  • Adriel Desautels, President and CTO, Netragard, LLC.

Security of embedded systems is more important than ever. The growth in networking is just one reason. However, many embedded systems developers have insufficient knowledge of how to achieve security in their systems. David Kleidermacher, a world-renowned expert in this field, shares in this book his knowledge and long experience with other engineers. A very important book at the right time.

  • Prof. Dr.-Ing. Matthias Sturm, Leipzig University of Applied Sciences; Chairman, Embedded World Conference steering board

Product Details


Customer Reviews

Most Helpful Customer Reviews
1 of 1 people found the following review helpful
5.0 out of 5 stars Excellent Job! February 14, 2013
By CM
Format:Paperback|Verified Purchase
I have been designing and implementing security products for about 7+ years now (embedded systems for 12yrs) to "high assurance" standards and I have to say these authors have done a great job with this book. I usually don't like to buy books that have not been heavily rated yet, but with security books you don't want a 10 year old book (unless maybe it is cryptography!) if you want something that is relevant. That is why I am taking the time to rate this book. I encourage anyone considering this book to buy it right now. The issues and technologies are relevant and the authors have done a great job putting this together. I am very experienced in this area, but I think it is a pretty easy read... that being said I have only got through the first three chapters so far so I will update this if I change my mind!

UPDATE: I finished this book about a week ago and I still recommend it. However I will say it is a bit slanted toward Green Hills... probably has to do with the author's close relationship with them! (I'll let you look it up). So read with that in mind. You see a similar slant/sales job in the model driven design (MDD) section that was written by another person with a company that sells a tool for MDD. I would say read the content and get out the security concepts without taking too much stock in how it may reflect on a competiting vendor products.

I also want to add that as far as the "Embedded Cryptography" section of the book... it is nice to have in the book but if you want to learn about cryptography there are much better sources out there. This book isn't meant to just be a source for crypto so it makes sense but just want to make the readers aware. Some suggestions for a starter book that is "Applied Cryptography" by Schenier.
Read more ›
Comment | 
Was this review helpful to you?
1 of 1 people found the following review helpful
5.0 out of 5 stars A Comprehensive Snapshot September 4, 2012
By The T
Format:Paperback|Verified Purchase
Having developed secure embedded systems for 25 years, I am familiar with most of the topics covered in this book. And yet, I learned a variety of new concepts. From microkernels to cryptographic certification, from automotive applications to Android development, its breadth of coverage and depth of references makes Embedded Systems Security a fully comprehensive guide for state-of-the-art embedded security techniques and tools. Acquisition managers of embedded systems, whether they develop military radio networks or web-enabled coffee makers, should read this book before setting strategy, requirements or budgets. As the ubiquity of the "web of things" relentlessly increases, we must institutionalize these concepts and commit to rigorously implementing them if we want to evolve a more secure society. This book provides a comprehensive look at the security techniques and tools already available for developing the next generation of secure and reliable products and services.
Comment | 
Was this review helpful to you?
5.0 out of 5 stars Excellent book May 22, 2014
Format:Paperback
This is a must read for anyone in embedded development. The author points out many areas that are not being considered with today's development.
Comment | 
Was this review helpful to you?
4.0 out of 5 stars easy read January 28, 2013
By cj
Format:Paperback|Verified Purchase
Easy read. I have not read the entire book, but it does present good principles. I would suggest it as an overview book.
Comment | 
Was this review helpful to you?

More About the Author

Discover books, learn about writers, read author blogs, and more.


Forums

There are no discussions about this product yet.
Be the first to discuss this product with the community.
Start a new discussion
Topic:
First post:
Prompts for sign-in
 


Look for Similar Items by Category