The Embedded Linux Security Handbook: Fortify your embedded Linux systems from design to deployment
1146356277
The Embedded Linux Security Handbook: Fortify your embedded Linux systems from design to deployment
35.99 In Stock
The Embedded Linux Security Handbook: Fortify your embedded Linux systems from design to deployment

The Embedded Linux Security Handbook: Fortify your embedded Linux systems from design to deployment

The Embedded Linux Security Handbook: Fortify your embedded Linux systems from design to deployment

The Embedded Linux Security Handbook: Fortify your embedded Linux systems from design to deployment

eBook

$35.99 

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers

Product Details

ISBN-13: 9781835885659
Publisher: Packt Publishing
Publication date: 04/10/2025
Sold by: Barnes & Noble
Format: eBook
Pages: 278
File size: 11 MB
Note: This product may take a few minutes to download.

About the Author

Matt St. Onge is an Associate Principal Solutions Architect at Red Hat, focused on providing enablement through their Embedded Systems partner program. Since 2015, his activities at Red Hat have ranged from best practices sessions to design reviews and even leading rapid prototyping workshops. Matt has assisted hundreds of product teams over the past decade in building quality, secure Linux appliances. Matt has been active in the open source and Linux communities for over 30 years by contributing to solutions via GitHub, creating new projects for the benefit of the embedded systems community, and hosting webinars and user group meetings. When not building solutions in the lab, Matt can be found hiking with his dog in the mountains, golfing, or cooking elaborate meals on the grill for his extended family.

Table of Contents

Table of Contents
  1. Welcome to the Cyber Security Landscape
  2. Security Starts at the Design Table
  3. Applying Design Requirements Criteria - Hardware Selection
  4. Applying Design Requirements Criteria - the Operating System
  5. Basic Needs in My Build Chain
  6. Disk Encryption
  7. The Trusted Platform Module
  8. Boot, BIOS, and Firmware Security
  9. Image-Based Deployments
  10. Childproofing the Solution: Protection from the End-User and Their Environment
  11. Knowing the Threat Landscape - Staying Informed
  12. Are My Devices' Communications and Interactions Secure?
  13. Applying Government Security Standards - System Hardening
  14. Customer and Community Feedback Loops
From the B&N Reads Blog

Customer Reviews