From early prototypes and proposed applications, this book surveys the longer history of amplifying small amounts of hardware security into broader system security
Including real case study experience with security architecture and applications on multiple types of platforms.
Examines the theory, design, implementation of the IBM 4758 secure coprocessor platform and discusses real case study applications that exploit the unique capabilities of this platform.
Examines more recent cutting-edge experimental work in this area.
Written for security architects, application designers, and the general computer scientist interested in the evolution and use of this emerging technology.
Move from zero knowledge of programming to comfortably writing small to medium-sized programs in Python. Fully updated for Python 3, with code and examples throughout, the book explains Python codi...