Hardware security : (Record no. 2843)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01664nam a22002537a 4500 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20220607142759.0 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780128124772 |
040 ## - | |
-- | HITLIB |
-- | rda |
050 ## - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.9.A25 |
Item number | BHU |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Bhunia, Swarup |
Relator term | Author |
245 ## - TITLE STATEMENT | |
Title | Hardware security : |
Remainder of title | a hands-on learning approach/ |
Statement of responsibility, etc. | Bhunia, Swarup |
264 ## - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Cambridge, MA : |
Name of producer, publisher, distributor, manufacturer | Morgan Kaufmann, |
Date of production, publication, distribution, manufacture, or copyright notice | 2019 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 502 pages; |
Other physical details | illustrations. |
336 ## - | |
-- | rdacontent |
-- | text |
-- | txt |
337 ## - | |
-- | rdamedia |
-- | unmediated |
-- | n |
338 ## - | |
-- | rdacarrier |
-- | volume |
-- | nc |
500 ## - GENERAL NOTE | |
General note | Includes index |
505 ## - | |
-- | Part 1: Background on Electronic Hardware --<br/>Part 2: Hardware Attacks: Analysis, Examples, and Threat Models --<br/>Part 3: Countermeasures Against Hardware Attacks --<br/>Part 4: Emerging Trends in Hardware Attacks and Protections. |
520 ## - | |
-- | Hardware Security: A Hands-On Learning Approach provides a broad, comprehensive and practical overview of hardware security ,encompassing all levels of the electronic devices and systems. It covers a wide range of topics, from basic concepts to advanced attack techniques and countermeasures. This topics are explained and illustrated through theory, case studies and well-designed, hands-on laboratory exercises for each key concept. The book is designed to serve as a textbook for upper-level undergraduate students studying computer engineering, computer science, electrical engineering, and biomedical engineering, but is also an excellent reference for graduate students, researchers and industry professionals. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer Security |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Sécurité informatique |
700 ## - ADDED ENTRY--PERSONAL NAME | |
Personal name | Mark Tehranipoor |
Relator term | Co-author |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Library of Congress Classification |
Koha item type | Books |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Date acquired | Source of acquisition | Inventory number | Total Checkouts | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Library of Congress Classification | Harare Institute of Technology Main Library | Harare Institute of Technology Main Library | 07/06/2022 | Donation: Book Aid International | 4163/D | QA76.9.A25 BHU | BK002437 | 07/06/2022 | 1 | 07/06/2022 | Books |