O'Reilly logo

Practical Embedded Security by Timothy Stapko

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 10 Conclusion—Miscellaneous Security Issues and the Future of Embedded Applications Security

This book has been about securing embedded applications where resources are limited and cost is an issue. Before we delve into a couple of real applications in Chapters 11 and 12, we are going to cover a variety of topics that do not fit into any of the previous chapters, and may only be peripherally related to embedded applications, but should at least be mentioned. This book is targeted at relative novices in computer security, so this chapter is intended to be a springboard into other research. In this chapter, we will briefly cover a few of the more esoteric aspects of security, including the impact of programming language choice on security, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required