|
|
|
|
LEADER |
02818nam a22004575i 4500 |
001 |
978-3-8348-9581-3 |
003 |
DE-He213 |
005 |
20151204160400.0 |
007 |
cr nn 008mamaa |
008 |
100301s2009 gw | s |||| 0|eng d |
020 |
|
|
|a 9783834895813
|9 978-3-8348-9581-3
|
024 |
7 |
|
|a 10.1007/978-3-8348-9581-3
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
100 |
1 |
|
|a Wolf, Marko.
|e author.
|
245 |
1 |
0 |
|a Security Engineering for Vehicular IT Systems
|h [electronic resource] :
|b Improving the Trustworthiness and Dependability of Automotive IT Applications /
|c by Marko Wolf.
|
264 |
|
1 |
|a Wiesbaden :
|b Vieweg+Teubner,
|c 2009.
|
300 |
|
|
|a XXII, 228 p. 38 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a The Preliminaries -- Related Work -- Brief Background in Security and Cryptography -- The Threats -- Security-Critical Vehicular Applications -- Attackers and Attacks in the Automotive Domain -- Security Analysis and Characteristical Constraints in the Automotive Domain -- The Protection -- Vehicular Security Technologies -- Vehicular Security Mechanisms -- Organizational Security.
|
520 |
|
|
|a Even though most vehicular IT systems are indeed developed to face technical failures, they rarely consider a systematic malicious encroachment. However, in the degree that vehicular electronics are becoming software-driven, digitally networked and interactive IT systems, dependable security measures are essential to ensure driving safety and enable the automotive industry to achieve different legal requirements. Marko Wolf provides a comprehensive overview of the emerging area of vehicular security. Having identified potential threats, attacks, and attackers for current and future vehicular IT applications, the author presents practical security measures to meet the identified security requirements efficiently and dependably. The suggested implementations can contribute to ensure driving safety and protect the liability, the revenues, and the expertise of vehicle manufacturers and suppliers.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Automotive engineering.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Automotive Engineering.
|
650 |
2 |
4 |
|a Computer Science, general.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783834807953
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-8348-9581-3
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
950 |
|
|
|a Computer Science (Springer-11645)
|