000 | 03039nam a22004935i 4500 | ||
---|---|---|---|
001 | 978-3-031-01742-1 | ||
003 | DE-He213 | ||
005 | 20240730163709.0 | ||
007 | cr nn 008mamaa | ||
008 | 220601s2013 sz | s |||| 0|eng d | ||
020 |
_a9783031017421 _9978-3-031-01742-1 |
||
024 | 7 |
_a10.1007/978-3-031-01742-1 _2doi |
|
050 | 4 | _aTK7867-7867.5 | |
072 | 7 |
_aTJFC _2bicssc |
|
072 | 7 |
_aTEC008010 _2bisacsh |
|
072 | 7 |
_aTJFC _2thema |
|
082 | 0 | 4 |
_a621.3815 _223 |
100 | 1 |
_aLee, Ruby B. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _980016 |
|
245 | 1 | 0 |
_aSecurity Basics for Computer Architects _h[electronic resource] / _cby Ruby B. Lee. |
250 | _a1st ed. 2013. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2013. |
|
300 |
_aXVI, 96 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSynthesis Lectures on Computer Architecture, _x1935-3243 |
|
505 | 0 | _aPreface -- Threat-Based Design -- Security Policy Models -- Access Control -- Cryptography for Confidentiality and Integrity -- Public-Key Crytography -- Security Protocols -- Summary -- Bibliography -- Appendix: Further Readings -- Author's Biography. | |
520 | _aDesign for security is an essential aspect of the design of future computers. However, security is not well understood by the computer architecture community. Many important security aspects have evolved over the last several decades in the cryptography, operating systems, and networking communities. This book attempts to introduce the computer architecture student, researcher, or practitioner to the basic concepts of security and threat-based design. Past work in different security communities can inform our thinking and provide a rich set of technologies for building architectural support for security into all future computers and embedded computing devices and appliances. I have tried to keep the book short, which means that many interesting topics and applications could not be included. What the book focuses on are the fundamental security concepts, across different security communities, that should be understood by any computer architect trying to design or evaluate security-awarecomputer architectures. | ||
650 | 0 |
_aElectronic circuits. _919581 |
|
650 | 0 |
_aMicroprocessors. _980017 |
|
650 | 0 |
_aComputer architecture. _93513 |
|
650 | 1 | 4 |
_aElectronic Circuits and Systems. _980018 |
650 | 2 | 4 |
_aProcessor Architectures. _980019 |
710 | 2 |
_aSpringerLink (Online service) _980020 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031006142 |
776 | 0 | 8 |
_iPrinted edition: _z9783031028700 |
830 | 0 |
_aSynthesis Lectures on Computer Architecture, _x1935-3243 _980021 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-01742-1 |
912 | _aZDB-2-SXSC | ||
942 | _cEBK | ||
999 |
_c84888 _d84888 |