Index

A

Access Control and the Origins of Computer Security Theory , 3

B

Bluetooth , 122

C

Choosing Cryptographic Algorithms , 165
Combination Client/Server HTTP Applications , 138
Console Applications , 138
Cryptography , 8
Public-Key Cryptography , 11
Symmetric Cryptography , 10
Cryptography and Protocols , 60

D

Data Integrity and Authentication , 13
Digital Certificates , 16
Digital Signatures , 15
Message Digests , 13
Public-Key Infrastructures , 17
Dealing with Attacks , 180
Do We Need Cryptography? , 150

E

Email, DNS, DHCP, and SNMP , 145
Embedded Security Design , 87

F

File Transfer Protocol , 140

H

Hashing—Low Security, High Performance , 152
Is Hashing Considered Dangerous? , 156
High Performance in ...

Get Practical Embedded Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.