Previous
Previous Product Image

Windows Security Internals: A Deep Dive into Windows Authentication, Authorization, and Auditing by James Forshaw (Author)

Original price was: ₨ 2,890.Current price is: ₨ 1,960.
Next

Evasive Malware: A Field Guide to Detecting, Analyzing, and Defeating Advanced Threats by Kyle Cucci (Author)

Original price was: ₨ 2,000.Current price is: ₨ 1,620.
Next Product Image

Engineering Secure Devices: A Practical Guide for Embedded System Architects and Developers by Dominik Merli (Author)

Original price was: ₨ 3,000.Current price is: ₨ 2,040.

Engineering Secure Devices will guide you through crafting secure devices—from protecting crucial assets to the nature of attackers and the risks they pose. You’ll explore the technical intricacies and pros and cons of symmetric and asymmetric cryptography and learn how to use and analyze random number generators and cryptographic algorithms. You’ll learn how to ensure confidential data storage and secure memory, and devise secure device identity solutions and communication protocols to reinforce system architecture against potential threats. And finally, you’ll learn how to properly design secure boot and secure update processes, manage access control, and perform system monitoring to secure IoT devices.

Add to Wishlist
Add to Wishlist
SKU: Programming-93 Category: Tags: ,
Trust Badge Image
Description

Description

This practical guide to building embedded and IoT devices securely is an essential resource for current and future developers tasked with protecting users from the potential threats of these ubiquitous devices.

As an engineer, you know that countless devices—from industrial components to smart household appliances—rely on embedded computer systems. But how do you balance the need for robust security with performance and innovative product design?

Engineering Secure Devices will guide you through crafting secure devices—from protecting crucial assets to the nature of attackers and the risks they pose. You’ll explore the technical intricacies and pros and cons of symmetric and asymmetric cryptography and learn how to use and analyze random number generators and cryptographic algorithms. You’ll learn how to ensure confidential data storage and secure memory, and devise secure device identity solutions and communication protocols to reinforce system architecture against potential threats. And finally, you’ll learn how to properly design secure boot and secure update processes, manage access control, and perform system monitoring to secure IoT devices.

Real-world case studies throughout highlight practical applications, solutions, and obstacles, such as firmware updates with SWUpdate, secure communication with MQTT, and advanced access control with AppArmor.

You’ll also dig into topics like:

  • Analyzing the performance of cryptographic implementations in both hardware and software
  • Considerations for secure boot and software update processes to ensure ongoing firmware integrity
  • Designing robust device architectures that withstand attacks while maintaining critical operations
  • Developing strategies to detect and respond to anomalies or security breaches in embedded systems

Whether you’re an IoT developer or an embedded system architect, Engineering Secure Devices equips you with the indispensable knowledge to design, secure, and support the next generation of smart devices—from webcams to four-legged robots.

Additional information

Additional information

print

Digital Printed

Author

Dominik Merli

Cover

Paperback

Size

B5 ( 6.9 x 9.8 )

Reviews (0)

Reviews

There are no reviews yet.

Be the first to review “Engineering Secure Devices: A Practical Guide for Embedded System Architects and Developers by Dominik Merli (Author)”

Your email address will not be published. Required fields are marked *

Got Question? Call us 24/7!
Stay connected by subscribing to our updates and never miss the latest news!

newsletter

receive the latest updates, offers, and news directly in your inbox.

    All rights reserved. © BOOKPOINT 2025 Unauthorized use or duplication is prohibited.