Defensive Security Handbook: Best Practices for Securing Infrastructure
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook...
Essential Issues in SOC Design: Designing Complex Systems-on-Chip
This book originated from a workshop held at the DATE 2005 conference, namely Designing Complex SOCs. State-of-the-art in issues related to System-on-Chip (SoC) design by leading experts in the fields, covers IP development, verification, integration, chip implementation, testing and software.
SOC design is fast becoming the key...
Exploring SE for Android
Discover Security Enhancements (SE) for Android to build your own protected Android-based systems
About This Book
Learn the fundamental security models and motivations behind Linux, SELinux, and SE for Android.
Build and enable current security enhancements from the SE for Android project...
System-on-a-Chip: Design and Test This project started as an interim report. The purpose was to communicate
to various groups within Advantest about the main issues for system-on-achip
(SoC) design and testing and the common industrial practices. Over
one years time, a number of people contributed in various capacities to complete
Embedded Computer Systems: Architectures, Modeling, and Simulation: 8th International Workshop, SAMOS 2008, Samos, Greece, July 21-24, 2008, Proceedings This book constitutes the refereed proceedings of the 8th International Workshop on Systems, Architectures, Modeling, and Simulation, SAMOS 2008, held in Samos, Greece, in July 2008.
The 24 revised full papers presented together with a contamplative keynote and additional papers of two special workshop sessions were carefully reviewed and...
|Result Page: 5 4 3 2 1 |