Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying The Embedded Linux Security Handbook
  • Table Of Contents Toc
The Embedded Linux Security Handbook

The Embedded Linux Security Handbook

By : Matt St. Onge
3 (2)
close
close
The Embedded Linux Security Handbook

The Embedded Linux Security Handbook

3 (2)
By: Matt St. Onge

Overview of this book

As embedded Linux systems power countless devices in our daily lives, they’ve become prime targets for cyberattacks. In this in-depth guide to safeguarding your Linux devices, the author leverages his 30+ years of technology experience to help you mitigate the risks associated with hardware and software vulnerabilities. This book introduces you to the world of embedded systems, the brains behind your everyday appliances. It takes you through the different types of embedded systems, their uses, and the platforms they run on, while addressing their unique security challenges and support considerations. You’ll learn how to build a successful, secure, and user-friendly solution by exploring the critical hardware and software components that form the foundation of a secure appliance. We won't forget the human element either; you'll find out how to configure your system to prevent user errors and maintain its integrity. The book lets you put your newfound knowledge into action, guiding you through designing a robust build chain that supports the entire life cycle of your appliance solution, enabling seamless updates without your direct involvement. By the end of this book, you’ll be able to adapt your appliance to the ever-evolving threat landscape, ensuring its continued security and functionality in real-world conditions.
Table of Contents (20 chapters)
close
close
Lock Free Chapter
1
Part 1:Introduction to Embedded Systems and Secure Design
6
Part 2: Design Components
13
Part 3: The Build Chain, Appliance Lifecycle, and Continuous Improvement

Index

As this ebook edition doesn't have fixed pagination, the page numbers below are hyperlinked for reference only, based on the printed edition of this book.

A

Advanced Encryption Standard (AES) 102

Advanced RISC Machine (ARM) 48, 54, 55

AlmaLinux 28

AMD Ryzen 48

Americans with Disabilities Act (ADA) 20

appliance

configuring, for custom repository 98-100

appliance model 3

appliance solution 24

managed service 24

no support/self-support 25

offline support 25

online support 24, 25

replacements 25

appliance, with automated keys

LUKS, implementing on 104

artificial intelligence (AI) 41

automation 66

tool integration 66

B

Bank Secrecy Act (BSA) 19

BIOS types 122

bleeding-edge systems 53

bootc 132, 133

bootc bootable container image tooling 134, 135

limitations 136

booting system components 121, 122

boot-level security

examples 123

UEFI configuration, accessing 123...

CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
The Embedded Linux Security Handbook
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist download Download options font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon