The Embedded Linux Security Handbook: Fortify your embedded Linux systems from design to deployment
暫譯: 嵌入式 Linux 安全手冊:從設計到部署加固您的嵌入式 Linux 系統
St Onge, Matt, Krishnan, Rama
- 出版商: Packt Publishing
- 出版日期: 2025-04-10
- 售價: $1,720
- 貴賓價: 9.5 折 $1,634
- 語言: 英文
- 頁數: 278
- 裝訂: Quality Paper - also called trade paper
- ISBN: 1835885640
- ISBN-13: 9781835885642
-
相關分類:
嵌入式系統、Linux、資訊安全
海外代購書籍(需單獨結帳)
相關主題
商品描述
Written by Linux and open-source expert Matt St. Onge, this definitive guide helps you build and secure Linux-based appliances capable of withstanding the latest cyber threats
All formats include a free PDF and an invitation to the Embedded System Professionals community
Key Features:
- Develop secure, user-friendly interfaces with streamlined configuration, updates, and life cycle support
- Learn how to integrate popular security techniques for embedded Linux into the development process
- Integrate advanced hardware with software security features to enhance your solution's resilience
- Purchase of the print or Kindle book includes a free PDF eBook
Book Description:
As embedded Linux systems power countless devices in our daily lives, they've become prime targets for cyberattacks. In this in-depth guide to safeguarding your Linux devices, the author leverages his 30+ years of technology experience to help you mitigate the risks associated with hardware and software vulnerabilities.
This book introduces you to the world of embedded systems, the brains behind your everyday appliances. It takes you through the different types of embedded systems, their uses, and the platforms they run on, while addressing their unique security challenges and support considerations. You'll learn how to build a successful, secure, and user-friendly solution by exploring the critical hardware and software components that form the foundation of a secure appliance. We won't forget the human element either; you'll find out how to configure your system to prevent user errors and maintain its integrity. The book lets you put your newfound knowledge into action, guiding you through designing a robust build chain that supports the entire life cycle of your appliance solution, enabling seamless updates without your direct involvement.
By the end of this book, you'll be able to adapt your appliance to the ever-evolving threat landscape, ensuring its continued security and functionality in real-world conditions.
What You Will Learn:
- Understand how to determine the optimal hardware platform based on design criteria
- Recognize the importance of security by design in embedded systems
- Implement advanced security measures such as TPM, LUKS encryption, and Secure Boot processes
- Discover best practices for secure life cycle management, including appliance update and upgrade mechanisms
- Create a secure software supply chain efficiently
- Implement childproofing by controlling access and resources on the appliance
Who this book is for:
This book helps embedded systems professionals, embedded software engineers, and Linux security professionals gain the skills needed to address critical security requirements during the design, development, and testing of software for embedded systems. If you're a product manager or architect, this book will teach you how to identify and integrate essential security features based on the specific platforms and their intended users.
Table of Contents
- Welcome to the Cyber Security Landscape
- Security Starts at the Design Table
- Applying Design Requirements Criteria - Hardware Selection
- Applying Design Requirements Criteria - the Operating System
- Basic Needs in My Build Chain
- Disk Encryption
- The Trusted Platform Module
- Boot, BIOS, and Firmware Security
- Image-Based Deployments
- Childproofing the Solution: Protection from the End-User and Their Environment
- Knowing the Threat Landscape - Staying Informed
- Are My Devices' Communications and Interactions Secure?
- Applying Government Security Standards - System Hardening
- Customer and Community Feedback Loops
商品描述(中文翻譯)
本書由 Linux 和開源專家 Matt St. Onge 撰寫,這本權威指南幫助您構建和保護能夠抵禦最新網路威脅的基於 Linux 的設備
所有格式均包含免費 PDF 和邀請加入嵌入式系統專業人士社群
主要特點:
- 開發安全、易於使用的介面,簡化配置、更新和生命週期支援
- 學習如何將流行的嵌入式 Linux 安全技術整合到開發過程中
- 將先進的硬體與軟體安全功能整合,以增強解決方案的韌性
- 購買印刷版或 Kindle 書籍包括免費 PDF 電子書
書籍描述:
隨著嵌入式 Linux 系統為我們日常生活中的無數設備提供動力,它們已成為網路攻擊的主要目標。在這本深入的指南中,作者利用他超過 30 年的技術經驗,幫助您減輕與硬體和軟體漏洞相關的風險。
本書將帶您進入嵌入式系統的世界,這些系統是您日常設備的“大腦”。它將介紹不同類型的嵌入式系統、它們的用途以及運行的平台,同時解決它們獨特的安全挑戰和支援考量。您將學習如何通過探索構成安全設備基礎的關鍵硬體和軟體組件來構建成功、安全且易於使用的解決方案。我們也不會忽略人為因素;您將了解如何配置系統以防止用戶錯誤並維護其完整性。本書讓您將新學到的知識付諸實踐,指導您設計一個強健的構建鏈,支援設備解決方案的整個生命週期,實現無需您直接參與的無縫更新。
在本書結束時,您將能夠根據不斷演變的威脅環境調整您的設備,確保其在現實條件下的持續安全和功能性。
您將學到什麼:
- 理解如何根據設計標準確定最佳硬體平台
- 認識到嵌入式系統中設計安全的重要性
- 實施先進的安全措施,如 TPM、LUKS 加密和安全啟動過程
- 發現安全生命週期管理的最佳實踐,包括設備更新和升級機制
- 高效創建安全的軟體供應鏈
- 通過控制設備上的訪問和資源來實施防兒童措施
本書適合誰:
本書幫助嵌入式系統專業人士、嵌入式軟體工程師和 Linux 安全專業人士獲得在嵌入式系統的設計、開發和測試過程中滿足關鍵安全需求所需的技能。如果您是產品經理或架構師,本書將教您如何根據特定平台及其預期用戶識別和整合必要的安全功能。
目錄
- 歡迎來到網路安全環境
- 安全始於設計桌
- 應用設計需求標準 - 硬體選擇
- 應用設計需求標準 - 作業系統
- 我構建鏈中的基本需求
- 磁碟加密
- 受信任的平台模組
- 啟動、BIOS 和韌體安全
- 基於映像的部署
- 防兒童措施:保護終端用戶及其環境
- 了解威脅環境 - 保持資訊更新
- 我的設備通訊和互動是否安全?
- 應用政府安全標準 - 系統加固
- 客戶和社群反饋循環