Practical embedded security : building secure resource-constrained systems / / by Timothy Stapko.
Saved in:
Superior document: | Embedded technology series |
---|---|
: | |
TeilnehmendeR: | |
Year of Publication: | 2008 |
Language: | English |
Series: | Embedded technology series.
|
Online Access: | |
Physical Description: | xvii, 280 p. :; ill. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
500312846 |
---|---|
ctrlnum |
(MiAaPQ)500312846 (Au-PeEL)EBL312846 (CaPaEBR)ebr10190330 (CaONFJC)MIL103931 (OCoLC)639194450 |
collection |
bib_alma |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01400nam a2200373Ia 4500</leader><controlfield tag="001">500312846</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20200520144314.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">070608s2008 ne a sb 001 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">0750682159</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9780750682152</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)500312846</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL312846</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr10190330</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaONFJC)MIL103931</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)639194450</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK7895.E42</subfield><subfield code="b">S73 2008</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Stapko, Timothy John.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Practical embedded security</subfield><subfield code="h">[electronic resource] :</subfield><subfield code="b">building secure resource-constrained systems /</subfield><subfield code="c">by Timothy Stapko.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Amsterdam ;</subfield><subfield code="a">Boston :</subfield><subfield code="b">Elsevier/Newnes,</subfield><subfield code="c">c2008.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xvii, 280 p. :</subfield><subfield code="b">ill.</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Embedded technology series</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Embedded computer systems.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Embedded technology series.</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=312846</subfield><subfield code="z">Click to View</subfield></datafield></record></collection> |
record_format |
marc |
spelling |
Stapko, Timothy John. Practical embedded security [electronic resource] : building secure resource-constrained systems / by Timothy Stapko. Amsterdam ; Boston : Elsevier/Newnes, c2008. xvii, 280 p. : ill. Embedded technology series Includes bibliographical references and index. Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries. Embedded computer systems. Computer networks Security measures. Computer security. Electronic books. ProQuest (Firm) Embedded technology series. https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=312846 Click to View |
language |
English |
format |
Electronic eBook |
author |
Stapko, Timothy John. |
spellingShingle |
Stapko, Timothy John. Practical embedded security building secure resource-constrained systems / Embedded technology series |
author_facet |
Stapko, Timothy John. ProQuest (Firm) ProQuest (Firm) |
author_variant |
t j s tj tjs |
author2 |
ProQuest (Firm) |
author2_role |
TeilnehmendeR |
author_corporate |
ProQuest (Firm) |
author_sort |
Stapko, Timothy John. |
title |
Practical embedded security building secure resource-constrained systems / |
title_sub |
building secure resource-constrained systems / |
title_full |
Practical embedded security [electronic resource] : building secure resource-constrained systems / by Timothy Stapko. |
title_fullStr |
Practical embedded security [electronic resource] : building secure resource-constrained systems / by Timothy Stapko. |
title_full_unstemmed |
Practical embedded security [electronic resource] : building secure resource-constrained systems / by Timothy Stapko. |
title_auth |
Practical embedded security building secure resource-constrained systems / |
title_new |
Practical embedded security |
title_sort |
practical embedded security building secure resource-constrained systems / |
series |
Embedded technology series |
series2 |
Embedded technology series |
publisher |
Elsevier/Newnes, |
publishDate |
2008 |
physical |
xvii, 280 p. : ill. |
callnumber-first |
T - Technology |
callnumber-subject |
TK - Electrical and Nuclear Engineering |
callnumber-label |
TK7895 |
callnumber-sort |
TK 47895 E42 S73 42008 |
genre |
Electronic books. |
genre_facet |
Electronic books. |
url |
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=312846 |
illustrated |
Illustrated |
oclc_num |
639194450 |
work_keys_str_mv |
AT stapkotimothyjohn practicalembeddedsecuritybuildingsecureresourceconstrainedsystems AT proquestfirm practicalembeddedsecuritybuildingsecureresourceconstrainedsystems |
status_str |
n |
ids_txt_mv |
(MiAaPQ)500312846 (Au-PeEL)EBL312846 (CaPaEBR)ebr10190330 (CaONFJC)MIL103931 (OCoLC)639194450 |
hierarchy_parent_title |
Embedded technology series |
is_hierarchy_title |
Practical embedded security building secure resource-constrained systems / |
container_title |
Embedded technology series |
author2_original_writing_str_mv |
noLinkedField |
_version_ |
1792330680860934144 |