Bibliography

In the bibliography below, I have listed the most useful resources used to help write this book. Many of these are available online, and I have included a pdf copy with the tutorial examples to save you typing in the long URLs.

Chapter 1 Introduction

Book

Click here to kill everybody—Bruce Schneier—ISBN9780393608892

Paper

Lone actor terrorism and SIMAD

Cyberattack on critical infrastructure

  • jsis.washington.edu/news/cyberattack-critical-infrastructure-russia-ukrainian-power-grid-attacks/

Arm cyber security manifesto 2018/2019

Web resource

General security blog

IoT security ...

Get Designing Secure IoT Devices with the Arm Platform Security Architecture and Cortex-M33 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.