000 -LEADER |
fixed length control field |
nam a22 7a 4500 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
180308b xxu||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9783319500553 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Item number |
BHU |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Bhunia, Swarup |
245 ## - TITLE STATEMENT |
Title |
Fundamentals of IP and SoC security : design, verification, and debug |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Name of publisher, distributor, etc |
Springer, |
Date of publication, distribution, etc |
2017 |
Place of publication, distribution, etc |
Switzerland: |
300 ## - PHYSICAL DESCRIPTION |
Extent |
VI, 316 p. |
Other physical details |
ill. |
Dimensions |
24 cm. |
365 ## - TRADE PRICE |
Price type code |
EURO |
Price amount |
99.99, Rs. 8329.17 |
520 ## - SUMMARY, ETC. |
Summary, etc |
This book is about security in embedded systems and it provides an authoritative reference to all aspects of security in system-on-chip (SoC) designs. The authors discuss issues ranging from security requirements in SoC designs, definition of architectures and design choices to enforce and validate security policies, and trade-offs and conflicts involving security, functionality, and debug requirements. Coverage also includes case studies from the “trenches” of current industrial practice in design, implementation, and validation of security-critical embedded systems. Provides an authoritative reference and summary of the current state-of-the-art in security for embedded systems, hardware IPs and SoC designs; Takes a "cross-cutting" view of security that interacts with different design and validation components such as architecture, implementation, verification, and debug, each enforcing unique trade-offs; Includes high-level overview, detailed analysis on implementation, and relevant case studies on design/verification/debug issues related to IP/SoC security. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security |
|
Topical term or geographic name as entry element |
Data encryption |
|
Topical term or geographic name as entry element |
Security measures |
|
Topical term or geographic name as entry element |
Design Complexity |
|
Topical term or geographic name as entry element |
Information Security and Cryptography |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Ray, Sandip |
|
Personal name |
Sur-Kolay, Susmita |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Item type |
Books |