000 01354nam a2200349Ia 4500
001 0000094458
005 20171002054843.0
006 m u
007 cr cn|||||||||
008 070608s2008 ne a sb 001 0 eng d
020 _z0750682159
020 _z9780750682152
035 _a(CaPaEBR)ebr10190330
035 _a(OCoLC)228148331
040 _aCaPaEBR
_cCaPaEBR
050 1 4 _aTK7895.E42
_bS73 2008eb
100 1 _aStapko, Timothy John.
245 1 0 _aPractical embedded security
_h[electronic resource] :
_bbuilding secure resource-constrained systems /
_cby Timothy Stapko.
260 _aAmsterdam ;
_aBoston :
_bElsevier/Newnes,
_cc2008.
300 _axvii, 280 p. :
_bill.
490 1 _aEmbedded technology series
504 _aIncludes bibliographical references and index.
533 _aElectronic reproduction.
_bPalo Alto, Calif. :
_cebrary,
_d2009.
_nAvailable via World Wide Web.
_nAccess may be limited to ebrary affiliated libraries.
650 0 _aEmbedded computer systems.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aComputer security.
655 7 _aElectronic books.
_2local
710 2 _aebrary, Inc.
830 0 _aEmbedded technology series.
856 4 0 _uhttp://site.ebrary.com/lib/daystar/Doc?id=10190330
_zAn electronic book accessible through the World Wide Web; click to view
908 _a170314
942 0 0 _cEB
999 _c83613
_d83613