Index
A
Access Control and the Origins of Computer Security Theory , 3
B
Bluetooth , 122
C
Choosing Cryptographic Algorithms , 165
Combination Client/Server HTTP Applications , 138
Console Applications , 138
Cryptography and Protocols , 60
D
Data Integrity and Authentication , 13
Digital Certificates , 16
Digital Signatures , 15
Message Digests , 13
Public-Key Infrastructures , 17
Dealing with Attacks , 180
Do We Need Cryptography? , 150
F
File Transfer Protocol , 140
Get Practical Embedded Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.