Search preferences
Vai alla pagina principale dei risultati di ricerca

Filtri di ricerca

Tipo di articolo

  • Tutti i tipi di prodotto 
  • Libri (8)
  • Riviste e Giornali (Nessun altro risultato corrispondente a questo perfezionamento)
  • Fumetti (Nessun altro risultato corrispondente a questo perfezionamento)
  • Spartiti (Nessun altro risultato corrispondente a questo perfezionamento)
  • Arte, Stampe e Poster (Nessun altro risultato corrispondente a questo perfezionamento)
  • Fotografie (Nessun altro risultato corrispondente a questo perfezionamento)
  • Mappe (Nessun altro risultato corrispondente a questo perfezionamento)
  • Manoscritti e Collezionismo cartaceo (Nessun altro risultato corrispondente a questo perfezionamento)

Condizioni Maggiori informazioni

  • Nuovo (8)
  • Come nuovo, Ottimo o Quasi ottimo (Nessun altro risultato corrispondente a questo perfezionamento)
  • Molto buono o Buono (Nessun altro risultato corrispondente a questo perfezionamento)
  • Discreto o Mediocre (Nessun altro risultato corrispondente a questo perfezionamento)
  • Come descritto (Nessun altro risultato corrispondente a questo perfezionamento)

Legatura

  • Tutte 
  • Rilegato (Nessun altro risultato corrispondente a questo perfezionamento)
  • Brossura (8)

Ulteriori caratteristiche

  • Prima ed. (Nessun altro risultato corrispondente a questo perfezionamento)
  • Copia autograf. (Nessun altro risultato corrispondente a questo perfezionamento)
  • Sovracoperta (Nessun altro risultato corrispondente a questo perfezionamento)
  • Con foto (5)
  • Non Print on Demand (4)

Lingua (1)

Prezzo

Fascia di prezzo personalizzata (EUR)

Paese del venditore

  • Edgar Weippl

    Lingua: Inglese

    Editore: Springer International Publishing AG, Cham, 2013

    ISBN 10: 3031012100 ISBN 13: 9783031012105

    Da: Grand Eagle Retail, Bensenville, IL, U.S.A.

    Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

    Contatta il venditore

    EUR 38,77

    Spedizione gratuita
    Spedito in U.S.A.

    Quantità: 1 disponibili

    Aggiungi al carrello

    Paperback. Condizione: new. Paperback. In our digital world, integrated circuits are present in nearly every moment of our daily life. Even when using the coffee machine in the morning, or driving our car to work, we interact with integrated circuits. The increasing spread of information technology in virtually all areas of life in the industrialized world offers a broad range of attack vectors. So far, mainly software-based attacks have been considered and investigated, while hardware-based attacks have attracted comparatively little interest. The design and production process of integrated circuits is mostly decentralized due to financial and logistical reasons. Therefore, a high level of trust has to be established between the parties involved in the hardware development lifecycle. During the complex production chain, malicious attackers can insert non-specified functionality by exploiting untrusted processes and backdoors. This work deals with the ways in which such hidden, non-specified functionality can be introducedinto hardware systems. After briefly outlining the development and production process of hardware systems, we systematically describe a new type of threat, the hardware Trojan. We provide a historical overview of the development of research activities in this field to show the growing interest of international research in this topic. Current work is considered in more detail. We discuss the components that make up a hardware Trojan as well as the parameters that are relevant for an attack. Furthermore, we describe current approaches for detecting, localizing, and avoiding hardware Trojans to combat them effectively. Moreover, this work develops a comprehensive taxonomy of countermeasures and explains in detail how specific problems are solved. In a final step, we provide an overview of related work and offer an outlook on further research in this field. This work deals with the ways in which such hidden, non-specified functionality can be introducedinto hardware systems. After briefly outlining the development and production process of hardware systems, we systematically describe a new type of threat, the hardware Trojan. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.

  • Edgar Weippl

    Lingua: Inglese

    Editore: Springer International Publishing AG, Cham, 2013

    ISBN 10: 3031012100 ISBN 13: 9783031012105

    Da: AussieBookSeller, Truganina, VIC, Australia

    Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

    Contatta il venditore

    EUR 55,98

    Spedizione EUR 31,35
    Spedito da Australia a U.S.A.

    Quantità: 1 disponibili

    Aggiungi al carrello

    Paperback. Condizione: new. Paperback. In our digital world, integrated circuits are present in nearly every moment of our daily life. Even when using the coffee machine in the morning, or driving our car to work, we interact with integrated circuits. The increasing spread of information technology in virtually all areas of life in the industrialized world offers a broad range of attack vectors. So far, mainly software-based attacks have been considered and investigated, while hardware-based attacks have attracted comparatively little interest. The design and production process of integrated circuits is mostly decentralized due to financial and logistical reasons. Therefore, a high level of trust has to be established between the parties involved in the hardware development lifecycle. During the complex production chain, malicious attackers can insert non-specified functionality by exploiting untrusted processes and backdoors. This work deals with the ways in which such hidden, non-specified functionality can be introducedinto hardware systems. After briefly outlining the development and production process of hardware systems, we systematically describe a new type of threat, the hardware Trojan. We provide a historical overview of the development of research activities in this field to show the growing interest of international research in this topic. Current work is considered in more detail. We discuss the components that make up a hardware Trojan as well as the parameters that are relevant for an attack. Furthermore, we describe current approaches for detecting, localizing, and avoiding hardware Trojans to combat them effectively. Moreover, this work develops a comprehensive taxonomy of countermeasures and explains in detail how specific problems are solved. In a final step, we provide an overview of related work and offer an outlook on further research in this field. This work deals with the ways in which such hidden, non-specified functionality can be introducedinto hardware systems. After briefly outlining the development and production process of hardware systems, we systematically describe a new type of threat, the hardware Trojan. Shipping may be from our Sydney, NSW warehouse or from our UK or US warehouse, depending on stock availability.

  • Edgar Weippl

    Lingua: Inglese

    Editore: Springer International Publishing, 2013

    ISBN 10: 3031012100 ISBN 13: 9783031012105

    Da: AHA-BUCH GmbH, Einbeck, Germania

    Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

    Contatta il venditore

    EUR 35,30

    Spedizione EUR 61,17
    Spedito da Germania a U.S.A.

    Quantità: 1 disponibili

    Aggiungi al carrello

    Taschenbuch. Condizione: Neu. Druck auf Anfrage Neuware - Printed after ordering - In our digital world, integrated circuits are present in nearly every moment of our daily life. Even when using the coffee machine in the morning, or driving our car to work, we interact with integrated circuits. The increasing spread of information technology in virtually all areas of life in the industrialized world offers a broad range of attack vectors. So far, mainly software-based attacks have been considered and investigated, while hardware-based attacks have attracted comparatively little interest. The design and production process of integrated circuits is mostly decentralized due to financial and logistical reasons. Therefore, a high level of trust has to be established between the parties involved in the hardware development lifecycle. During the complex production chain, malicious attackers can insert non-specified functionality by exploiting untrusted processes and backdoors. This work deals with the ways in which such hidden, non-specified functionality can be introducedinto hardware systems. After briefly outlining the development and production process of hardware systems, we systematically describe a new type of threat, the hardware Trojan. We provide a historical overview of the development of research activities in this field to show the growing interest of international research in this topic. Current work is considered in more detail. We discuss the components that make up a hardware Trojan as well as the parameters that are relevant for an attack. Furthermore, we describe current approaches for detecting, localizing, and avoiding hardware Trojans to combat them effectively. Moreover, this work develops a comprehensive taxonomy of countermeasures and explains in detail how specific problems are solved. In a final step, we provide an overview of related work and offer an outlook on further research in this field.

  • Edgar Weippl (u. a.)

    Lingua: Inglese

    Editore: Springer, 2013

    ISBN 10: 3031012100 ISBN 13: 9783031012105

    Da: preigu, Osnabrück, Germania

    Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

    Contatta il venditore

    EUR 34,00

    Spedizione EUR 70,00
    Spedito da Germania a U.S.A.

    Quantità: 5 disponibili

    Aggiungi al carrello

    Taschenbuch. Condizione: Neu. Hardware Malware | Edgar Weippl (u. a.) | Taschenbuch | xi | Englisch | 2013 | Springer | EAN 9783031012105 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu.

  • Weippl, Edgar

    Lingua: Inglese

    Editore: Springer, 2013

    ISBN 10: 3031012100 ISBN 13: 9783031012105

    Da: Brook Bookstore On Demand, Napoli, NA, Italia

    Valutazione del venditore 4 su 5 stelle 4 stelle, Maggiori informazioni sulle valutazioni dei venditori

    Contatta il venditore

    Print on Demand

    EUR 32,62

    Spedizione EUR 5,50
    Spedito da Italia a U.S.A.

    Quantità: Più di 20 disponibili

    Aggiungi al carrello

    Condizione: new. Questo è un articolo print on demand.

  • Edgar Weippl

    Lingua: Inglese

    Editore: Springer International Publishing Okt 2013, 2013

    ISBN 10: 3031012100 ISBN 13: 9783031012105

    Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania

    Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

    Contatta il venditore

    Print on Demand

    EUR 35,30

    Spedizione EUR 23,00
    Spedito da Germania a U.S.A.

    Quantità: 2 disponibili

    Aggiungi al carrello

    Taschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -In our digital world, integrated circuits are present in nearly every moment of our daily life. Even when using the coffee machine in the morning, or driving our car to work, we interact with integrated circuits. The increasing spread of information technology in virtually all areas of life in the industrialized world offers a broad range of attack vectors. So far, mainly software-based attacks have been considered and investigated, while hardware-based attacks have attracted comparatively little interest. The design and production process of integrated circuits is mostly decentralized due to financial and logistical reasons. Therefore, a high level of trust has to be established between the parties involved in the hardware development lifecycle. During the complex production chain, malicious attackers can insert non-specified functionality by exploiting untrusted processes and backdoors. This work deals with the ways in which such hidden, non-specified functionality can be introduced into hardware systems. After briefly outlining the development and production process of hardware systems, we systematically describe a new type of threat, the hardware Trojan. We provide a historical overview of the development of research activities in this field to show the growing interest of international research in this topic. Current work is considered in more detail. We discuss the components that make up a hardware Trojan as well as the parameters that are relevant for an attack. Furthermore, we describe current approaches for detecting, localizing, and avoiding hardware Trojans to combat them effectively. Moreover, this work develops a comprehensive taxonomy of countermeasures and explains in detail how specific problems are solved. In a final step, we provide an overview of related work and offer an outlook on further research in this field. 116 pp. Englisch.

  • Weippl, Edgar|Krieg, Christian|Dabrowski, Adrian|Krombholz, Katharina|Hobel, Heidelinde

    Lingua: Inglese

    Editore: Springer, Berlin|Springer International Publishing|Morgan & Claypool|Springer, 2013

    ISBN 10: 3031012100 ISBN 13: 9783031012105

    Da: moluna, Greven, Germania

    Valutazione del venditore 4 su 5 stelle 4 stelle, Maggiori informazioni sulle valutazioni dei venditori

    Contatta il venditore

    Print on Demand

    EUR 32,69

    Spedizione EUR 48,99
    Spedito da Germania a U.S.A.

    Quantità: Più di 20 disponibili

    Aggiungi al carrello

    Condizione: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. In our digital world, integrated circuits are present in nearly every moment of our daily life. Even when using the coffee machine in the morning, or driving our car to work, we interact with integrated circuits. The increasing spread of information technol.

  • Edgar Weippl

    Lingua: Inglese

    Editore: Springer International Publishing, Springer International Publishing Okt 2013, 2013

    ISBN 10: 3031012100 ISBN 13: 9783031012105

    Da: buchversandmimpf2000, Emtmannsberg, BAYE, Germania

    Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

    Contatta il venditore

    Print on Demand

    EUR 35,30

    Spedizione EUR 60,00
    Spedito da Germania a U.S.A.

    Quantità: 1 disponibili

    Aggiungi al carrello

    Taschenbuch. Condizione: Neu. This item is printed on demand - Print on Demand Titel. Neuware -In our digital world, integrated circuits are present in nearly every moment of our daily life. Even when using the coffee machine in the morning, or driving our car to work, we interact with integrated circuits. The increasing spread of information technology in virtually all areas of life in the industrialized world offers a broad range of attack vectors. So far, mainly software-based attacks have been considered and investigated, while hardware-based attacks have attracted comparatively little interest. The design and production process of integrated circuits is mostly decentralized due to financial and logistical reasons. Therefore, a high level of trust has to be established between the parties involved in the hardware development lifecycle. During the complex production chain, malicious attackers can insert non-specified functionality by exploiting untrusted processes and backdoors. This work deals with the ways in which such hidden, non-specified functionality can be introducedinto hardware systems. After briefly outlining the development and production process of hardware systems, we systematically describe a new type of threat, the hardware Trojan. We provide a historical overview of the development of research activities in this field to show the growing interest of international research in this topic. Current work is considered in more detail. We discuss the components that make up a hardware Trojan as well as the parameters that are relevant for an attack. Furthermore, we describe current approaches for detecting, localizing, and avoiding hardware Trojans to combat them effectively. Moreover, this work develops a comprehensive taxonomy of countermeasures and explains in detail how specific problems are solved. In a final step, we provide an overview of related work and offer an outlook on further research in this field.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 116 pp. Englisch.