CHAPTER 4
HARDWARE ELEMENTS OF SECURITY
Sy Bosworth and Stephen Cobb
4.3.1 Vertical Redundancy Checks
4.3.2 Longitudinal Redundancy Checks
4.3.3 Cyclical Redundancy Checks
4.13 MICROCOMPUTER CONSIDERATIONS
4.13.5 Threats to Microcomputers
4.15 HARDWARE SECURITY CHECKLIST
4.1 INTRODUCTION.
Computer hardware has always played a major role in computer security. Over the years, that role has increased dramatically, due to both the increases in processing power, storage capacity, and communications capabilities as well as the decreases in cost and size of components. The ubiquity of cheap, powerful, highly connected computing devices poses significant challenges to computer ...
Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.