Security Engineering for Vehicular IT Systems Improving the Trustworthiness and Dependability of Automotive IT Applications /

Even though most vehicular IT systems are indeed developed to face technical failures, they rarely consider a systematic malicious encroachment. However, in the degree that vehicular electronics are becoming software-driven, digitally networked and interactive IT systems, dependable security measure...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριος συγγραφέας: Wolf, Marko (Συγγραφέας)
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Wiesbaden : Vieweg+Teubner, 2009.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 02818nam a22004575i 4500
001 978-3-8348-9581-3
003 DE-He213
005 20151204160400.0
007 cr nn 008mamaa
008 100301s2009 gw | s |||| 0|eng d
020 |a 9783834895813  |9 978-3-8348-9581-3 
024 7 |a 10.1007/978-3-8348-9581-3  |2 doi 
040 |d GrThAP 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
100 1 |a Wolf, Marko.  |e author. 
245 1 0 |a Security Engineering for Vehicular IT Systems  |h [electronic resource] :  |b Improving the Trustworthiness and Dependability of Automotive IT Applications /  |c by Marko Wolf. 
264 1 |a Wiesbaden :  |b Vieweg+Teubner,  |c 2009. 
300 |a XXII, 228 p. 38 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a The Preliminaries -- Related Work -- Brief Background in Security and Cryptography -- The Threats -- Security-Critical Vehicular Applications -- Attackers and Attacks in the Automotive Domain -- Security Analysis and Characteristical Constraints in the Automotive Domain -- The Protection -- Vehicular Security Technologies -- Vehicular Security Mechanisms -- Organizational Security. 
520 |a Even though most vehicular IT systems are indeed developed to face technical failures, they rarely consider a systematic malicious encroachment. However, in the degree that vehicular electronics are becoming software-driven, digitally networked and interactive IT systems, dependable security measures are essential to ensure driving safety and enable the automotive industry to achieve different legal requirements. Marko Wolf provides a comprehensive overview of the emerging area of vehicular security. Having identified potential threats, attacks, and attackers for current and future vehicular IT applications, the author presents practical security measures to meet the identified security requirements efficiently and dependably. The suggested implementations can contribute to ensure driving safety and protect the liability, the revenues, and the expertise of vehicle manufacturers and suppliers. 
650 0 |a Computer science. 
650 0 |a Computer security. 
650 0 |a Automotive engineering. 
650 1 4 |a Computer Science. 
650 2 4 |a Systems and Data Security. 
650 2 4 |a Automotive Engineering. 
650 2 4 |a Computer Science, general. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783834807953 
856 4 0 |u http://dx.doi.org/10.1007/978-3-8348-9581-3  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
950 |a Computer Science (Springer-11645)