Building secure cars : (Record no. 69483)

000 -LEADER
fixed length control field 03810cam a22005538i 4500
001 - CONTROL NUMBER
control field on1195816476
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220711203647.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 200909s2021 nju ob 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119710783
-- (electronic bk. : oBook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1119710782
-- (electronic bk. : oBook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119710776
-- (epub)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1119710774
-- (epub)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119710769
-- (adobe pdf)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1119710766
-- (adobe pdf)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
-- (cloth)
029 1# - (OCLC)
OCLC library identifier AU@
System control number 000068253685
082 00 - CLASSIFICATION NUMBER
Call Number 629.2/72
100 1# - AUTHOR NAME
Author Oka, Dennis Kengo,
245 10 - TITLE STATEMENT
Title Building secure cars :
Sub Title assuring the automotive software development lifecycle /
250 ## - EDITION STATEMENT
Edition statement First edition.
300 ## - PHYSICAL DESCRIPTION
Number of Pages 1 online resource
520 ## - SUMMARY, ETC.
Summary, etc "Connectivity and software-based automotive components are now the norm in motor manufacturing, and there can be more than 100 million lines of code in a modern car, making the vehicle highly vulnerable to hacking and other cybersecurity attacks. In response, the automotive industry is investing heavily in security software, effectively creating secure cars. Written by a seasoned automotive expert with international industry expertise, this book introduces readers to the different types of security solutions, with the aim of helping software development and test teams identify vulnerabilities quickly and efficiently. Common problems and pitfalls, based on real-world experiences, are discussed and solutions provided. The aim of the book is to assist auto industry insiders overcome cybersecurity challenges by incorporating security into their software lifecycle to help build more secure and safe cars"--
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Overview of the Current State of Cybersecurity in the Automotive Industry -- Introduction to Security in the Automotive Software Development Lifecycle -- Automotive-Grade Secure Hardware -- Need for Automated Security Solutions in the Automotive Software Development Lifecycle -- Static Code Analysis for Automotive Software -- Software Composition Analysis in the Automotive Industry -- Overview of Automotive Security Testing Approaches -- Automating Fuzz Testing of In-Vehicle Systems by Integrating with Automotive Test Tools -- Improving Fuzz Testing Coverage by Using Agent Instrumentation -- Automating File Fuzzing over USB for Automotive Systems -- Automation and Traceability by Integrating Application Security Testing Tools into ALM Systems -- Continuous Cybersecurity Monitoring, Vulnerability Management, Incident Response, and Secure OTA Updates -- Summary and Next Steps.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Programming.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://doi.org/10.1002/9781119710783
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Hoboken, NJ :
-- John Wiley & Sons, Inc.,
-- 2021.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- n
-- rdamedia
338 ## -
-- online resource
-- nc
-- rdacarrier
520 ## - SUMMARY, ETC.
-- Provided by publisher.
588 ## -
-- Description based on print version record and CIP data provided by publisher; resource not viewed.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Automotive telematics
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Automotive computers
994 ## -
-- 92
-- DG1

No items available.