Have a personal or library account? Click to login
The Embedded Linux Security Handbook Cover

The Embedded Linux Security Handbook

Fortify your embedded Linux systems from design to deployment

Paid access
|Sep 2025
Product purchase options

Table of Contents

  1. Welcome to the Cyber Security Landscape
  2. Security Starts at the Design Table
  3. Applying Design Requirements Criteria - Hardware Selection
  4. Applying Design Requirements Criteria - the Operating System
  5. Basic Needs in My Build Chain
  6. Disk Encryption
  7. The Trusted Platform Module
  8. Boot, BIOS, and Firmware Security
  9. Image-Based Deployments
  10. Childproofing the Solution: Protection from the End-User and Their Environment
  11. Knowing the Threat Landscape - Staying Informed
  12. Are My Devices' Communications and Interactions Secure?
  13. Applying Government Security Standards - System Hardening
  14. Customer and Community Feedback Loops
PDF ISBN: 978-1-83588-565-9
Publisher: Packt Publishing Limited
Copyright owner: © 2025 Packt Publishing Limited
Publication date: 2025
Language: English
Pages: 278