The Embedded Linux Security Handbook: Fortify your embedded Linux systems from design to deployment

★★★★★ 5.0 142 reviews

$39.99
Price when purchased online
Free shipping Free 30-day returns

Sold and shipped by democodigos.pollafutbol.co
We aim to show you accurate product information. Manufacturers, suppliers and others provide what you see here.
$39.99
Price when purchased online
Free shipping Free 30-day returns

How do you want your item?
You get 30 days free! Choose a plan at checkout.
Shipping
Arrives May 7
Free
Pickup
Check nearby
Delivery
Not available

Sold and shipped by democodigos.pollafutbol.co
Free 30-day returns Details

Product details

Management number 219222854 Release Date 2026/05/03 List Price $16.00 Model Number 219222854
Category

Written by Linux and open-source expert Matt St. Onge, this definitive guide helps you build and secure Linux-based appliances capable of withstanding the latest cyber threatsAll formats include a free PDF and an invitation to the Embedded System Professionals communityKey FeaturesDevelop secure, user-friendly interfaces with streamlined configuration, updates, and life cycle supportLearn how to integrate popular security techniques for embedded Linux into the development processIntegrate advanced hardware with software security features to enhance your solution’s resiliencePurchase of the print or Kindle book includes a free PDF eBookBook DescriptionAs embedded Linux systems power countless devices in our daily lives, they’ve become prime targets for cyberattacks. In this in-depth guide to safeguarding your Linux devices, the author leverages his 30+ years of technology experience to help you mitigate the risks associated with hardware and software vulnerabilities.This book introduces you to the world of embedded systems, the brains behind your everyday appliances. It takes you through the different types of embedded systems, their uses, and the platforms they run on, while addressing their unique security challenges and support considerations. You’ll learn how to build a successful, secure, and user-friendly solution by exploring the critical hardware and software components that form the foundation of a secure appliance. We won't forget the human element either; you'll find out how to configure your system to prevent user errors and maintain its integrity. The book lets you put your newfound knowledge into action, guiding you through designing a robust build chain that supports the entire life cycle of your appliance solution, enabling seamless updates without your direct involvement.By the end of this book, you’ll be able to adapt your appliance to the ever-evolving threat landscape, ensuring its continued security and functionality in real-world conditions.What you will learnUnderstand how to determine the optimal hardware platform based on design criteriaRecognize the importance of security by design in embedded systemsImplement advanced security measures such as TPM, LUKS encryption, and Secure Boot processesDiscover best practices for secure life cycle management, including appliance update and upgrade mechanismsCreate a secure software supply chain efficientlyImplement childproofing by controlling access and resources on the applianceWho this book is forThis book helps embedded systems professionals, embedded software engineers, and Linux security professionals gain the skills needed to address critical security requirements during the design, development, and testing of software for embedded systems. If you’re a product manager or architect, this book will teach you how to identify and integrate essential security features based on the specific platforms and their intended users.Table of ContentsWelcome to the Cyber Security LandscapeSecurity Starts at the Design TableApplying Design Requirements Criteria - Hardware SelectionApplying Design Requirements Criteria - the Operating SystemBasic Needs in My Build ChainDisk EncryptionThe Trusted Platform ModuleBoot, BIOS, and Firmware SecurityImage-Based DeploymentsChildproofing the Solution: Protection from the End-User and Their EnvironmentKnowing the Threat Landscape - Staying InformedAre My Devices' Communications and Interactions Secure?(N.B. Please use the Read Sample option to see further chapters) Read more

ISBN10 1835885640
ISBN13 978-1835885659
Language English
Publisher Packt Publishing
Dimensions 7.5 x 0.64 x 9.25 inches
Item Weight 1.08 pounds
Print length 278 pages
Publication date April 10, 2025

Correction of product information

If you notice any omissions or errors in the product information on this page, please use the correction request form below.

Correction Request Form

Customer ratings & reviews

5 out of 5
★★★★★
142 ratings | 58 reviews
How item rating is calculated
View all reviews
5 stars
90% (128)
4 stars
0% (0)
3 stars
0% (0)
2 stars
0% (0)
1 star
10% (14)
Sort by

There are currently no written reviews for this product.