Security Engineering for Vehicular IT Systems Improving the Trustworthiness and Dependability of Automotive IT Applications /

Even though most vehicular IT systems are indeed developed to face technical failures, they rarely consider a systematic malicious encroachment. However, in the degree that vehicular electronics are becoming software-driven, digitally networked and interactive IT systems, dependable security measure...

Full description

Bibliographic Details
Main Author: Wolf, Marko. (Author)
Corporate Author: SpringerLink (Online service)
Format: Electronic
Language:English
Published: Wiesbaden : Vieweg+Teubner, 2009.
Subjects:
Online Access:https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-3-8348-9581-3
LEADER 02231nam a22003855i 4500
001 7911
003 DE-He213
005 20130725192414.0
007 cr nn 008mamaa
008 100301s2009 gw | s |||| 0|eng d
020 # # |a 9783834895813  |9 978-3-8348-9581-3 
024 7 # |a 10.1007/978-3-8348-9581-3  |2 doi 
050 # 4 |a QA75.5-76.95 
072 # 7 |a UY  |2 bicssc 
072 # 7 |a COM014000  |2 bisacsh 
082 0 4 |a 004  |2 23 
100 1 # |a Wolf, Marko.  |e author. 
245 1 0 |a Security Engineering for Vehicular IT Systems  |b Improving the Trustworthiness and Dependability of Automotive IT Applications /  |c by Marko Wolf.  |h [electronic resource] : 
264 # 1 |a Wiesbaden :  |b Vieweg+Teubner,  |c 2009. 
300 # # |a XXII, 228p. 38 illus.  |b online resource. 
336 # # |a text  |b txt  |2 rdacontent 
337 # # |a computer  |b c  |2 rdamedia 
338 # # |a online resource  |b cr  |2 rdacarrier 
347 # # |a text file  |b PDF  |2 rda 
520 # # |a Even though most vehicular IT systems are indeed developed to face technical failures, they rarely consider a systematic malicious encroachment. However, in the degree that vehicular electronics are becoming software-driven, digitally networked and interactive IT systems, dependable security measures are essential to ensure driving safety and enable the automotive industry to achieve different legal requirements. Marko Wolf provides a comprehensive overview of the emerging area of vehicular security. Having identified potential threats, attacks, and attackers for current and future vehicular IT applications, the author presents practical security measures to meet the identified security requirements efficiently and dependably. The suggested implementations can contribute to ensure driving safety and protect the liability, the revenues, and the expertise of vehicle manufacturers and suppliers. 
650 # 0 |a Computer science. 
650 1 4 |a Computer Science. 
650 2 4 |a Computer Science, general. 
710 2 # |a SpringerLink (Online service) 
773 0 # |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783834807953 
856 4 0 |u https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-3-8348-9581-3 
912 # # |a ZDB-2-SCS 
950 # # |a Computer Science (Springer-11645)