//]]>

Handbook of FPGA Design Security (Record no. 12488)

000 -LEADER
fixed length control field 02696nam a22004335i 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20140310143358.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 100623s2010 ne | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9789048191574
978-90-481-9157-4
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 621.3815
Edition number 23
264 #1 -
-- Dordrecht :
-- Springer Netherlands :
-- Imprint: Springer,
-- 2010.
912 ## -
-- ZDB-2-ENG
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Huffmire, Ted.
Relator term author.
245 10 - IMMEDIATE SOURCE OF ACQUISITION NOTE
Title Handbook of FPGA Design Security
Medium [electronic resource] /
Statement of responsibility, etc by Ted Huffmire, Cynthia Irvine, Thuy D. Nguyen, Timothy Levin, Ryan Kastner, Timothy Sherwood.
300 ## - PHYSICAL DESCRIPTION
Extent XVIII, 177p.
Other physical details online resource.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note and Motivation -- High Assurance Software Lessons and Techniques -- Hardware Security Challenges -- FPGA Updates and Programmability -- Memory Protection on FPGAs -- Spatial Separation with Moats -- Putting It All Together: A Design Example -- Forward-Looking Problems.
520 ## - SUMMARY, ETC.
Summary, etc The purpose of Handbook of FPGA Design Security is to provide a practical approach to managing security in FPGA designs for researchers and practitioners in the electronic design automation (EDA) and FPGA communities, including corporations, industrial and government research labs, and academics. Handbook of FPGA Design Security combines theoretical underpinnings with a practical design approach and worked examples for combating real world threats. To address the spectrum of lifecycle and operational threats against FPGA systems, a holistic view of FPGA security is presented, from formal top level specification to low level policy enforcement mechanisms. This perspective integrates recent advances in the fields of computer security theory, languages, compilers, and hardware. The net effect is a diverse set of static and runtime techniques that, working in cooperation, facilitate the composition of robust, dependable, and trustworthy systems using commodity components.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Engineering.
Topical term or geographic name as entry element Systems engineering.
Topical term or geographic name as entry element Engineering.
Topical term or geographic name as entry element Circuits and Systems.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Irvine, Cynthia.
Relator term author.
Personal name Nguyen, Thuy D.
Relator term author.
Personal name Levin, Timothy.
Relator term author.
Personal name Kastner, Ryan.
Relator term author.
Personal name Sherwood, Timothy.
Relator term author.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer eBooks
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9789048191567
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-90-481-9157-4
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type E-Book
Copies
Price effective from Permanent location Date last seen Not for loan Date acquired Source of classification or shelving scheme Koha item type Damaged status Lost status Withdrawn status Current location Full call number
2014-04-03AUM Main Library2014-04-03 2014-04-03 E-Book   AUM Main Library621.3815

Languages: 
English |
العربية