Security Engineering for Vehicular IT Systems (e-bog) af Wolf, Marko
Wolf, Marko (forfatter)

Security Engineering for Vehicular IT Systems e-bog

436,85 DKK (inkl. moms 546,06 DKK)
Information technology is the driving force behind almost all innovations in the automotive industry, with perhaps 90% of all innovations in cars based on digital electronics and software. Dozens of networked microprocessors and several h- dred megabytes of software can be found in a common compact class car, contr- ling engine and driving functions, assisting the driver and enabling various c-...
E-bog 436,85 DKK
Forfattere Wolf, Marko (forfatter)
Udgivet 26 juli 2009
Genrer Automotive technology and trades
Sprog English
Format pdf
Beskyttelse LCP
ISBN 9783834895813
Information technology is the driving force behind almost all innovations in the automotive industry, with perhaps 90% of all innovations in cars based on digital electronics and software. Dozens of networked microprocessors and several h- dred megabytes of software can be found in a common compact class car, contr- ling engine and driving functions, assisting the driver and enabling various c- fort, infotainment and safety functions. One crucial aspect of digital systems in vehicles is their security. Whereas software safety is a relatively well-established (if not necessarily well-understood) ?eld, the protection of automotive IT s- tems against malicious manipulations has only recently started to emerge. Even though many European car manufacturers have lately established R&D groups that are dedicated to embedded security in cars, so far there has not been an a- encompassing reference of this topic. The book by Dr. Marko Wolf ?lls this gap, and is by far the most comprehensive treatment of IT security in vehicles available today. A particular challenge of au- motive IT security is its interdisciplinary nature. Dr. Wolf has done an outstanding job incorporating disjoint areas in one comprehensive treatment. The book ranges from the relevant security technologies to a systematic analysis of security risks all the way to solution using state-of-the-art security methods. Despite the fact that much of the material is based on results from the research community, Dr.