Limit search to available items
Add Marked to Bag Add All On Page Add Marked to My Lists
Subjects (1-21 of 21)
Embedded computer systems -- Security measures
4
Location Call no. Vol. Availability
 W'PONDS  629.2310285 Lem/Esi  AVAILABLE
9
E-book
2022

The hardware hacking handbook : breaking embedded security with hardware attacks


Woudenberg, Jasper van, author.

San Francisco, CA : No Starch Press, 2022

Rating:

 
10
12
13
14
E-book
2015

Securing cyber-physical systems




Boca Raton : CRC Press, [2015]

Rating:

 
15
Book
2009

Security and dependability for ambient intelligence




New York : Springer, [2009]

Rating:

Request It 
 
Location Call no. Vol. Availability
 W'PONDS  006.3 Spa/Sad  AVAILABLE
16
Book
2010

Security in embedded devices


Gebotys, Catherine H.

New York ; London : Springer, [2010]

Rating:

Request It 
 
Location Call no. Vol. Availability
 W'PONDS  005.8 Geb/Sie  AVAILABLE
17
E-book
2010

Security in embedded devices


Gebotys, Catherine H



Rating:

 
19
E-book
2013

Software test attacks to break mobile and embedded devices


Hagar, Jon Duncan

Boca Raton : Taylor & Francis, 2013

Rating:

 
20
E-book
2014

Software test attacks to break mobile and embedded devices


Hagar, Jon Duncan, author.

Boca Raton, FL : CRC Press, [2014]

Rating:

 
21
E-book
2014

Trusted computing for embedded systems




Cham : Springer, [2014]

Rating:

 
Add Marked to Bag Add All On Page
Locate in results