/
The Embedded Linux Security Handbook: Fortify your embedded Linux systems from design to deployment
The Embedded Linux Security Handbook: Fortify your embedded Linux systems from design to deployment

The Embedded Linux Security Handbook: Fortify your embedded Linux systems from design to deployment

by Matt St. Onge (Author)
★★★★★
★★★★★

4.1|7 ratings

Save 30%31.49$44.99
Prime
In Stock

FREE delivery Wednesday, June 18 on orders shipped by Amazon over $35 Or Prime members get FREE delivery Sunday, June 15. Order within 15 hrs 38 mins. Join Prime

Free delivery with Prime

What customers say

Customers praise the book's knowledge level, with one review highlighting its real-world examples. The book receives positive feedback for its pacing, with one customer noting its clear explanations and well-structured content.

31.49with Prime
FREE delivery Wednesday, June 18 on orders shipped by Amazon over $35 Or Prime members get FREE delivery Sunday, June 15. Order within 15 hrs 38 mins. Join Prime
In Stock
Secure transaction

Ships from and sold by Amazon.US

Return policy: Eligible for Return, Refund or Replacement

Written by Linux and open-source expert Matt St. Onge, this definitive guide helps you build and secure Linux-based appliances capable of withstanding the latest cyber threats"In the face of growing cybersecurity threats, this book by Matt St. Onge fills a critical gap by providing a comprehensive guide to Linux security tailored for those who build and maintain embedded Linux systems or appliances."- Rama Krishnan, Senior Director of Engineering, Veritas TechnologiesAll formats include a free PDF and an invitation to the Embedded System Professionals communityBook DescriptionAs embedded Linux systems power countless devices in our daily lives, they’ve become prime targets for cyberattacks. In this in-depth guide to safeguarding your Linux devices, the author leverages his 30+ years of technology experience to help you mitigate the risks associated with hardware and software vulnerabilities.This book introduces you to the world of embedded systems, the brains behind your everyday appliances. It takes you through the different types of embedded systems, their uses, and the platforms they run on while addressing their unique security challenges and support considerations. You’ll learn to build a successful, secure, and user-friendly solution by exploring the critical hardware and software components that form the foundation of a secure appliance. We won't forget the human element either; you'll find out how to configure your system to prevent user errors and maintain its integrity. The book lets you put your newfound knowledge into action, guiding you through designing a robust build chain that supports the entire life cycle of your appliance solution, enabling seamless updates without your direct involvement.By the end of this book, you’ll be able to adapt your appliance to the ever-evolving threat landscape, ensuring its continued security and functionality in real-world conditions.What you will learnUnderstand how to determine the optimal hardware platform based on design criteriaRecognize the importance of security by design in embedded systemsImplement advanced security measures such as TPM, LUKS encryption, and secure boot processesDiscover best practices for secure life cycle management, including appliance update and upgrade mechanismsCreate a secure software supply chain efficientlyImplement childproofing by controlling access and resources on the applianceWho this book is forThis book helps embedded systems professionals, embedded software engineers, and Linux security professionals gain the skills needed to address critical security requirements during the design, development, and testing of software for embedded systems. If you’re a product manager or architect, this book will teach you how to identify and integrate essential security features based on the specific platforms and their intended users.Table of ContentsWelcome to the Cyber Security LandscapeSecurity Starts at the Design TableApplying Design Requirements Criteria - Hardware SelectionApplying Design Requirements Criteria - The Operating SystemBasic Needs in my Build ChainTrusted Platform ModuleDisk EncryptionBoot, BIOS, and Firmware SecurityRPM-OSTREE and the Immutable Operating SystemChild-proofing the solution - protecting the device from the End-User & their environmentKnowing the threat landscape - staying informedAre my devices' communications and interactions secure?Applying Government Security Standards - Systems HardeningCustomer & Community feedback loops help keep your solution secure Read more

Product Information

ASINB0DJCDXJ27
PublisherPackt Publishing
Publication dateApril 10, 2025
LanguageEnglish
Print length278 pages
ISBN-101835885640
ISBN-13978-1835885659
Item Weight1.34 pounds
Dimensions0.74 x 7.5 x 9.25 inches
Best Sellers Rank#876,891 in Books (See Top 100 in Books) #28 in Computer Hardware Embedded Systems #55 in Linux & UNIX Administration (Books) #77 in Linux Networking & System Administration
Customer Reviews4.1 4.1 out of 5 stars 7 ratings

Similar Products