Marknadens största urval
Snabb leverans

Böcker av Vincent Zimmer

Filter
Filter
Sortera efterSortera Populära
  • av Subrata Banik
    876,-

    Find the right bootloader solution or combination of firmware required to boot a platform considering its security, product features, and optimized boot solutions. This book covers system boot firmware, focusing on real-world firmware migration from closed source to open source adaptation.The book provides an architectural overview of popular boot firmware. This includes both closed sourced and/or open source in nature, such as Unified Extensible Firmware Interface (UEFI), coreboot, and Slim Bootloader and their applicable market segments based on product development and deployment requirements. Traditional system firmware is often complex and closed sourced whereas modern firmware is still a kind of hybrid between closed and open source. But what might a future firmware model look like? The most simplistic boot firmware solution uses open source firmware development. This book helps you decide how to choose the right boot firmware for your products and develop your own boot firmware using open source. Coverage includes:Why open source firmware is used over closed sourceThe pros and cons of closed and open source firmwareA hybrid work model: for faster bring-up activity using closed source, binary integrated with open source firmwareWhat You Will LearnUnderstand the architecture of standard and popular boot firmwarePick the correct bootloader for your required target hardwareDesign a hybrid workflow model for the latest chipset platformUnderstand popular payload architectures and offerings for embedded systemsSelect the right payload for your bootloader solution to boot to the operating systemOptimize the system firmware boot time based on your target hardware requirementKnow the product development cycle using open source firmware developmentWho This Book Is For                                                 Embedded firmware and software engineers migrating the product development from closed source firmware to open source firmware for product adaptation needs as well as engineers working for open source firmware development. A secondary audience includes engineers working on various bootloaders such as open source firmware, UEFI, and Slim Bootloader development, as well as undergraduate and graduate students working on developing firmware skill sets.

  • - Armoring the Foundation of the Platform
    av Vincent Zimmer & Jiewen Yao
    736,-

    Use this book to build secure firmware.As operating systems and hypervisors have become successively more hardened, malware has moved further down the stack and into firmware. Firmware represents the boundary between hardware and software, and given its persistence, mutability, and opaqueness to today's antivirus scanning technology, it represents an interesting target for attackers.As platforms are universally network-connected and can contain multiple devices with firmware, and a global supply chain feeds into platform firmware, assurance is critical for consumers, IT enterprises, and governments. This importance is highlighted by emergent requirements such as NIST SP800-193 for firmware resilience and NIST SP800-155 for firmware measurement.This book covers the secure implementation of various aspects of firmware, including standards-based firmware-such as support of the Trusted Computing Group (TCG), Desktop Management Task Force (DMTF), and Unified Extensible Firmware Interface (UEFI) specifications-and also provides code samples and use cases. Beyond the standards, alternate firmware implementations such as ARM Trusted Firmware and other device firmware implementations (such as platform roots of trust), are covered.What You Will LearnGet an overview of proactive security development for firmware, including firmware threat modelingUnderstand the details of architecture, including protection, detection, recovery, integrity measurement, and access controlBe familiar with best practices for secure firmware development, including trusted execution environments, cryptography, and language-based defensesKnow the techniques used for security validation and maintenanceWho This Book Is ForGiven the complexity of modern platform boot requirements and the threat landscape, this book is relevant for readers spanning from IT decision makers to developers building firmware

Gör som tusentals andra bokälskare

Prenumerera på vårt nyhetsbrev för att få fantastiska erbjudanden och inspiration för din nästa läsning.