Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Hardware security: a hands-on learning approach
Bookmark Share

Text

Hardware security: a hands-on learning approach

Bhunia, Swarup - Personal Name; Tehranipoor, Mark - Personal Name;

Hardware Security: A Hands-On Learning Approach provides a broad, comprehensive and practical overview of hardware security that encompasses all levels of the electronic hardware infrastructure. It covers basic concepts like advanced attack techniques and countermeasures that are illustrated through theory, case studies and well-designed, hands-on laboratory exercises for each key concept. The book is ideal as a textbook for upper-level undergraduate students studying computer engineering, computer science, electrical engineering, and biomedical engineering, but is also a handy reference for graduate students, researchers and industry professionals. For academic courses, the book contains a robust suite of teaching ancillaries.

Table Contents
Chapter 1: Introduction to Hardware Security
Part 1: Background on Electronic Hardware
Chapter 2: A Quick Overview of Electronic Hardware
Chapter 3: System on Chip (SoC) Design and Test
Chapter 4: Printed Circuit Board (PCB): Design and Test

Part 2: Hardware Attacks: Analysis, Examples, and Threat Models
Chapter 5: Hardware Trojans
Chapter 6: Electronics Supply Chain
Chapter 7: Hardware IP Piracy and Reverse Engineering
Chapter 8: Side-Channel Attacks
Chapter 9: Test-Oriented Attacks
Chapter 10: Physical Attacks and Countermeasures
Chapter 11: Attacks on PCB: Security Challenges and Vulnerabilities

Part 3: Countermeasures Against Hardware Attacks
Chapter 12: Hardware Security Primitives
Chapter 13: Security and Trust Assessment, and Design for Security
Chapter 14: Hardware Obfuscation
Chapter 15: PCB Authentication and Integrity Validation

Part 4: Emerging Trends in Hardware Attacks and Protections
Chapter 16: System Level Attacks & Countermeasures

Index


Availability
#
Rekayasa Perangkat Keras Kriptografi (Rak 000) 005.82 BHU h
b0002495
Available
#
Perpustakaan Poltek SSN (Rak 000) 005.82 BHU h/2
b0002300
Currently On Loan (Due on 2025-08-11)
Detail Information
Series Title
--
Call Number
005.82 BHU h
Publisher
Cambridge : Morgan Kaufmann., 2019
Collation
xxiii, 502 hlm.; ilus.; 23,5 cm
Language
English
ISBN/ISSN
9780128124772
Classification
005.82
Content Type
-
Media Type
-
Carrier Type
-
Edition
-
Subject(s)
Computer security
Computer hardware
Computing systems
Specific Detail Info
--
Statement of Responsibility
Swarup Bhunia dan Mark Tehranipoor
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?