Da: GreatBookPrices, Columbia, MD, U.S.A.
EUR 57,81
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Da: GreatBookPrices, Columbia, MD, U.S.A.
EUR 59,91
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Da: Ria Christie Collections, Uxbridge, Regno Unito
EUR 55,56
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. In.
Lingua: Inglese
Editore: VDM Verlag Dr. Mueller e.K. 2008-05-23, 2008
ISBN 10: 3639027833 ISBN 13: 9783639027839
Da: Chiron Media, Wallingford, Regno Unito
EUR 53,58
Quantità: 10 disponibili
Aggiungi al carrelloPaperback. Condizione: New.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 55,55
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 63,58
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Lingua: Inglese
Editore: VDM Verlag Dr. Müller, VDM Verlag Dr. Müller E.K., 2008
ISBN 10: 3639027833 ISBN 13: 9783639027839
Da: AHA-BUCH GmbH, Einbeck, Germania
EUR 75,05
Quantità: 2 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. Neuware - The research on security issues is getting more important, as the number of embedded and networked computing systems is increasing constantly. Due to strict restrictions and requirements, only special software is used in security-critical and embedded systems. Therefore, it is also necessary to secure those software applications with a special hardware implementation of a secure processor architecture against vulnerabilities and attacks. The main idea of this book was to develop a processor core extension that provides an improved capability against software vulnerabilities and improves the security of target systems passively. This architecture can directly execute bound checking for every data access. Processor registers were added, which contain the lowest and highest value, a particular register is allowed to hold. Therefore, checks can be executed directly in hardware without performance loss, whereas checking in software would make any application intolerably slow. Based on new concepts of intermediate languages, which support data-type information within meta data at the intermediate language level, the changes would be restricted to the last step in the compilation process.
Da: PBShop.store US, Wood Dale, IL, U.S.A.
EUR 60,15
Quantità: Più di 20 disponibili
Aggiungi al carrelloPAP. Condizione: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Da: PBShop.store UK, Fairford, GLOS, Regno Unito
EUR 57,50
Quantità: Più di 20 disponibili
Aggiungi al carrelloPAP. Condizione: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.