Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.

LEADER 00000cam a2200613 i 4500 
003    OCoLC 
005    20240129213017.0 
006    m     o  d         
007    cr cnu---unuuu 
008    201031s2020    xxu     ob    001 0 eng d 
019    1204140523|a1225892681|a1264805889 
020    9781484261064|q(electronic bk.) 
020    1484261062|q(electronic bk.) 
024 7  10.1007/978-1-4842-6106-4|2doi 
029 1  AU@|b000068143744 
029 1  AU@|b000068812300 
029 1  AU@|b000068856876 
035    (OCoLC)1202437977|z(OCoLC)1204140523|z(OCoLC)1225892681
       |z(OCoLC)1264805889 
037    |bSpringer 
040    YDX|beng|erda|epn|cYDX|dEBLCP|dUKAHL|dDCT|dYDXIT|dOCLCF
       |dGW5XE|dSNK|dOCLCO|dOCL|dOCLCQ|dOCLCO|dCOM|dOCLCQ|dOCLCO 
049    INap 
082 04 005.8 
082 04 005.8|223 
099    eBook O'Reilly for Public Librairies 
100 1  Yao, Jiewen. 
245 10 Building secure firmware :|barmoring the foundation of the
       platform /|cJiewen Yao, Vincent Zimmer.|h[O'Reilly 
       electronic resource] 
264  1 [United States] :|bApress,|c2020. 
300    1 online resource 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
347    text file 
347    |bPDF 
504    Includes bibliographical references and index. 
505 0  Part I: Overview -- Chapter 1: Introduction to Firmware --
       Chapter 2: Proactive Firmware Security Development -- Part
       II: Security Architecture -- Chapter 3: Firmware 
       Resilience -- Protection -- Chapter 4: Firmware Resilience
       -- Detection -- Chapter 5: Firmware Resilience -- Recovery
       -- Chapter 6: OS Resilience -- Chapter 7: Trusted Boot -- 
       Chapter 8: Device Security -- Chapter 9: S3 Resume -- 
       Chapter 10: Access Control -- Chapter 11: Configuration --
       Chapter 12: Security Model -- Chapter 13: Virtual Firmware
       -- Part III: Security Development -- Chapter 14: General 
       Coding Practice -- Chapter 15: Compiler Defensive 
       Technology -- Chapter 16: The Kernel -- Chapter 17: 
       Trusted Execution Environment -- Chapter 18: Silicon 
       Security Configuration -- Chapter 19: Cryptography -- 
       Chapter 20: Programming Language -- Part IV: Security Test
       and Maintenance -- Chapter 21: Security Unit Test -- 
       Chapter 22: Security Validation and Penetration -- Chapter
       23: Maintenance. 
520    Use this book to build secure firmware. As operating 
       systems and hypervisors have become successively more 
       hardened, malware has moved further down the stack and 
       into firmware. Firmware represents the boundary between 
       hardware and software, and given its persistence, 
       mutability, and opaqueness to today's antivirus scanning 
       technology, it represents an interesting target for 
       attackers. As platforms are universally network-connected 
       and can contain multiple devices with firmware, and a 
       global supply chain feeds into platform firmware, 
       assurance is critical for consumers, IT enterprises, and 
       governments. This importance is highlighted by emergent 
       requirements such as NIST SP800-193 for firmware 
       resilience and NIST SP800-155 for firmware measurement. 
       This book covers the secure implementation of various 
       aspects of firmware, including standards-based firmware--
       such as support of the Trusted Computing Group (TCG), 
       Desktop Management Task Force (DMTF), and Unified 
       Extensible Firmware Interface (UEFI) specifications--and 
       also provides code samples and use cases. Beyond the 
       standards, alternate firmware implementations such as ARM 
       Trusted Firmware and other device firmware implementations
       (such as platform roots of trust), are covered. You will: 
       Get an overview of proactive security development for 
       firmware, including firmware threat modeling Understand 
       the details of architecture, including protection, 
       detection, recovery, integrity measurement, and access 
       control Be familiar with best practices for secure 
       firmware development, including trusted execution 
       environments, cryptography, and language-based defenses 
       Know the techniques used for security validation and 
       maintenance. 
590    O'Reilly|bO'Reilly Online Learning: Academic/Public 
       Library Edition 
650  0 Computer firmware|xSecurity measures. 
650  0 Computer security. 
650  0 Data protection. 
650  2 Computer Security 
650  6 Microprogrammes|xSécurité|xMesures. 
650  6 Sécurité informatique. 
650  6 Protection de l'information (Informatique) 
650  7 Computer security|2fast 
650  7 Data protection|2fast 
700 1  Zimmer, Vincent. 
776 08 |iPrint version:|aYao, Jiewen.|tBuilding secure firmware.
       |d[United States] : Apress, 2020|z1484261054
       |z9781484261057|w(OCoLC)1156340193 
856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https://
       learning.oreilly.com/library/view/~/9781484261064/?ar
       |zAvailable on O'Reilly for Public Libraries 
938    Askews and Holts Library Services|bASKH|nAH37890038 
938    ProQuest Ebook Central|bEBLB|nEBL6381363 
938    YBP Library Services|bYANK|n301703645 
994    92|bJFN