Table Of Contents
Chapter 1. Introduction to Embedded Systems Security
1.2 What is an Embedded System?
Chapter 2. Systems Software Considerations
2.1 The Role of the Operating System
2.2 Multiple Independent Levels of Security
2.3 Microkernel versus Monolith
2.4 Core Embedded Operating System Security Requirements
2.5 Access Control and Capabilities
2.6 Hypervisors and System Virtualization
Get Embedded Systems Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.