• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Emerging Topics in Hardware Security » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2949965]
• Literatura piękna
 [1857847]

  więcej...
• Turystyka
 [70818]
• Informatyka
 [151303]
• Komiksy
 [35733]
• Encyklopedie
 [23180]
• Dziecięca
 [617748]
• Hobby
 [139972]
• AudioBooki
 [1650]
• Literatura faktu
 [228361]
• Muzyka CD
 [398]
• Słowniki
 [2862]
• Inne
 [444732]
• Kalendarze
 [1620]
• Podręczniki
 [167233]
• Poradniki
 [482388]
• Religia
 [509867]
• Czasopisma
 [533]
• Sport
 [61361]
• Sztuka
 [243125]
• CD, DVD, Video
 [3451]
• Technologie
 [219309]
• Zdrowie
 [101347]
• Książkowe Klimaty
 [123]
• Zabawki
 [2362]
• Puzzle, gry
 [3791]
• Literatura w języku ukraińskim
 [253]
• Art. papiernicze i szkolne
 [7933]
Kategorie szczegółowe BISAC

Emerging Topics in Hardware Security

ISBN-13: 9783030644505 / Angielski / Miękka / 2022

Tehranipoor, Mark
Emerging Topics in Hardware Security Tehranipoor, Mark 9783030644505 Springer International Publishing - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Emerging Topics in Hardware Security

ISBN-13: 9783030644505 / Angielski / Miękka / 2022

Tehranipoor, Mark
cena 322,77 zł
(netto: 307,40 VAT:  5%)

Najniższa cena z 30 dni: 308,41 zł
Termin realizacji zamówienia:
ok. 22 dni roboczych
Bez gwarancji dostawy przed świętami

Darmowa dostawa!

This book provides an overview of emerging topics in the field of hardware security, such as artificial intelligence and quantum computing, and highlights how these technologies can be leveraged to secure hardware and assure electronics supply chains. The authors are experts in emerging technologies, traditional hardware design, and hardware security and trust. Readers will gain a comprehensive understanding of hardware security problems and how to overcome them through an efficient combination of conventional approaches and emerging technologies, enabling them to design secure, reliable, and trustworthy hardware.

Kategorie:
Technologie
Kategorie BISAC:
Technology & Engineering > Electronics - Circuits - General
Technology & Engineering > Electrical
Computers > Computer Architecture
Wydawca:
Springer International Publishing
Język:
Angielski
ISBN-13:
9783030644505
Rok wydania:
2022
Waga:
0.95 kg
Wymiary:
23.5 x 15.5
Oprawa:
Miękka
Dodatkowe informacje:
Wydanie ilustrowane

Introduction.- Blockchain for Supply Chain Integrity.- Backside is a new Backdoor.- Post-quantum HW Security.- Microfluidic device security.- ML in HW Security.- Digital Twin.- HLS Security Assessment.- CAD for SCA: SCRIPT.- Analog Obfuscation.- CAD for Physical Assurance.- Neuromorphic Security.- Post quantum Crypto Hardware.- Trillion Sensors Security.- Homomorphic Encryption.- Software Security with HW in Mind.- Security of Emerging Memories.- Firmware Obfuscation.- Computer Vision in HW Security.

Mark Tehranipoor is currently the Intel Charles E. Young Preeminence Endowed Chair Professor in Cybersecurity at the Department of Electrical and Computer Engineering, the University of Florida. He has published over 500 journal articles and refereed conference papers and has delivered more than 200 invited talks and keynote addresses in international conferences, industry consortiums and government. In addition, he has 8 patents and has published 11 books and 25 book chapters. He is a recipient of 12 best paper awards and nominations, the 2009 NSF CAREER award, the 2014 MURI award on Nanoscale Security, the 2008 IEEE Computer Society (CS) Meritorious Service Award, the 2012 and 2017 IEEE CS Outstanding Contribution, the 2010 and 2016 IEEE TTTC/CS Most Successful Technical Event for co-founding and chairing HOST Symposium. He co-founded IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) and served as HOST-2008 and HOST-2009 General Chair and continues to serve as Chair of the Steering Committee for HOST. He also co-founded IEEE Asian-HOST. Further, he co-founded Journal on Hardware and Systems Security (HaSS) and currently serving as EIC for HaSS. He is also a co-founder of Trust-Hub. He served as associate Editor-in-Chief (EIC) for IEEE Design and Test of Computers from 2012-2014. He is currently serving as an Associate Editor for IEEE Design and Test of Computers, an Associate Editor for JETTA, an Associate Editor for Journal of Low Power Electronics (JOLPE), an Associate Editor for ACM Transactions for Design Automation of Electronic Systems (TODAES), and an Associate Editor for IEEE Transactions on VLSI (TVLSI). He has served as an IEEE Distinguished Speaker and an ACM Distinguished Speaker from 2010-2013. Dr. Tehranipoor is a Fellow of the IEEE, Golden Core Member of IEEE Computer Society, and Member of ACM and ACM SIGDA. He is also a member of the Connecticut Academy of Science and Engineering (CASE).


This book provides an overview of emerging topics in the field of hardware security, such as artificial intelligence and quantum computing, and highlights how these technologies can be leveraged to secure hardware and assure electronics supply chains. The authors are experts in emerging technologies, traditional hardware design, and hardware security and trust. Readers will gain a comprehensive understanding of hardware security problems and how to overcome them through an efficient combination of conventional approaches and emerging technologies, enabling them to design secure, reliable, and trustworthy hardware.

  • Offers a high-level introduction to current hardware security problems;
  • Provides a thorough discussion of a wide variety of emerging topics and technologies (e.g., artificial intelligence, blockchain, and quantum computing) and their applications to hardware security problems;
  • Covers state-of-the-art techniques, as well as ongoing research efforts in emerging technologies in hardware security;
  • Provides guidance and techniques to design and security engineers on protecting their design using emerging technologies.





Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia