Libros sobre el tema "Hardware Security"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores mejores libros para su investigación sobre el tema "Hardware Security".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore libros sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Tehranipoor, Mark, Kimia Zamiri Azar, Navid Asadizanjani, Fahim Rahman, Hadi Mardani Kamali, and Farimah Farahmandi. Hardware Security. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-58687-3.
Texto completoTehranipoor, Mark, Nitin Pundir, Nidish Vashistha, and Farimah Farahmandi. Hardware Security Primitives. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-19185-5.
Texto completoSadeghi, Ahmad-Reza, and David Naccache, eds. Towards Hardware-Intrinsic Security. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14452-3.
Texto completoSklavos, Nicolas, Ricardo Chaves, Giorgio Di Natale, and Francesco Regazzoni, eds. Hardware Security and Trust. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-44318-8.
Texto completoHalak, Basel, ed. Hardware Supply Chain Security. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-62707-2.
Texto completoFarahmandi, Farimah, M. Sazadur Rahman, Sree Ranjani Rajendran, and Mark Tehranipoor. CAD for Hardware Security. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-26896-0.
Texto completoTehranipoor, Mark, ed. Emerging Topics in Hardware Security. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-64448-2.
Texto completoKatkoori, Srinivas, and Sheikh Ariful Islam, eds. Behavioral Synthesis for Hardware Security. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-78841-4.
Texto completoMishra, Prabhat, Swarup Bhunia, and Mark Tehranipoor, eds. Hardware IP Security and Trust. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-49025-0.
Texto completoTehranipoor, Mark, N. Nalla Anandakumar, and Farimah Farahmandi. Hardware Security Training, Hands-on! Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-31034-8.
Texto completoMishra, Ashutosh, Mrinal Goswami, Manoj Kumar, and Navin Singh Rajput, eds. Hardware Security: Challenges and Solutions. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-81213-2.
Texto completoKelly, Wayne. Security hardware and security system planning for museums. Canadian Conservation Institute, 1998.
Buscar texto completoKelly, Wayne. Security hardware and security system planning for museums. Canadian Conservation Institute, 1998.
Buscar texto completoRangarajan, Nikhil, Satwik Patnaik, Johann Knechtel, Shaloo Rakheja, and Ozgur Sinanoglu. The Next Era in Hardware Security. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-85792-9.
Texto completoTehranipoor, Mohammad, and Cliff Wang, eds. Introduction to Hardware Security and Trust. Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4419-8080-9.
Texto completoCliff, Wang, and SpringerLink (Online service), eds. Introduction to Hardware Security and Trust. Springer Science+Business Media, LLC, 2012.
Buscar texto completoTang, Beng Chiew. Security Engineering of Hardware-Software Interfaces. [publisher not identified], 2018.
Buscar texto completoRaj, Balwinder, and Arun Kumar Singh. Nanoelectronic Devices for Hardware and Software Security. CRC Press, 2021. http://dx.doi.org/10.1201/9781003126645.
Texto completoKhalil, Kasem, Haytham Idriss, Tarek Idriss, and Magdy Bayoumi. Lightweight Hardware Security and Physically Unclonable Functions. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-76328-1.
Texto completoSantikellur, Pranesh, and Rajat Subhra Chakraborty. Deep Learning for Computational Problems in Hardware Security. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-4017-0.
Texto completoPATRANABIS, SIKHAR, and Debdeep Mukhopadhyay, eds. Fault Tolerant Architectures for Cryptography and Hardware Security. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-1387-4.
Texto completoLast, R. W. PC security: Aprofessional guide to hardware and data protection. Sigma, 1990.
Buscar texto completoVemuri, Ranga, and Suyuan Chen. Split Manufacturing of Integrated Circuits for Hardware Security and Trust. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73445-9.
Texto completoL, Antonakos James, ed. Computer networking from LANs to WANs: Hardware, software and security. Course Technology, Cengage Learning, 2010.
Buscar texto completoSakiyama, Kazuo. Security of block ciphers: From algorithm design to hardware implementation. John Wiley & Sons Inc., 2015.
Buscar texto completoGuha, Krishnendu, Sangeet Saha, and Amlan Chakrabarti. Self Aware Security for Real Time Task Schedules in Reconfigurable Hardware Platforms. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79701-0.
Texto completoMukhopadhyay, Debdeep, and Rajat Subhra Chakraborty. Hardware Security. Chapman and Hall/CRC, 2014. http://dx.doi.org/10.1201/b17555.
Texto completoPundir, Nitin, Nidish Vashishta, Mark Tehranipoor, and Farimah Farahmandi. Hardware Security Primitives. Springer International Publishing AG, 2022.
Buscar texto completoVashistha, Nidish. Hardware Security Primitives. Springer International Publishing AG, 2023.
Buscar texto completoBlokdyk, Gerardus. Hardware security module: Core. Createspace Independent Publishing Platform, 2017.
Buscar texto completoRahman, M. Sazadur. CAD for Hardware Security. Springer International Publishing AG, 2024.
Buscar texto completoRahman, M. Sazadur. CAD for Hardware Security. Springer International Publishing AG, 2023.
Buscar texto completoThe Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks. No Starch Press, 2021.
Buscar texto completoMishra, Prabhat, Swarup Bhunia, and Mark Tehranipoor. Hardware IP Security and Trust. Springer, 2018.
Buscar texto completoEmerging Topics in Hardware Security. Springer International Publishing AG, 2021.
Buscar texto completoTehranipoor, Mark. Emerging Topics in Hardware Security. Springer International Publishing AG, 2022.
Buscar texto completoMishra, Prabhat, Swarup Bhunia, and Mark Tehranipoor. Hardware IP Security and Trust. Springer, 2017.
Buscar texto completoMishra, Prabhat, Swarup Bhunia, and Mark Tehranipoor. Hardware IP Security and Trust. Springer, 2017.
Buscar texto completoKatkoori, Srinivas, and Sheikh Ariful Islam. Behavioral Synthesis for Hardware Security. Springer International Publishing AG, 2021.
Buscar texto completo(Editor), Nadia Nedjah, Luiza De Macedo Mourelle (Editor), and Luiza De Macedo Mourelle (Editor), eds. Embedded Cryptographic Hardware: Design & Security. Nova Science Publishers, 2006.
Buscar texto completoAnandakumar, N. Nalla. Hardware Security Training, Hands-On! Springer International Publishing AG, 2023.
Buscar texto completoBehavioral Synthesis for Hardware Security. Springer International Publishing AG, 2023.
Buscar texto completoBhunia, Swarup, Domenic Forte, and Mark M. Tehranipoor. Hardware Protection through Obfuscation. Springer, 2018.
Buscar texto completoBhunia, Swarup, Domenic Forte, and Mark M. Tehranipoor. Hardware Protection through Obfuscation. Springer, 2017.
Buscar texto completoBhunia, Swarup, Domenic Forte, and Mark M. Tehranipoor. Hardware Protection Through Obfuscation. Springer, 2017.
Buscar texto completoChakraborty, Rajat Subhra, and Debdeep Mukhopadhyay. Hardware Security: Design, Threats, and Safeguards. Taylor & Francis Group, 2014.
Buscar texto completoGunn, Lachlan J., Jan-Erik Ekberg, Hans Liljestrand, Vijayanand Nayani, and N. Asokan. Hardware Platform Security for Mobile Devices. Now Publishers, 2022.
Buscar texto completo