| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA996392168003316 |
|
|
Titolo |
A book of Christian exercise [[electronic resource] ] : apperteining to resolution, that is, shewing how that we should resolue our selues to become Christians in deed: by R.P. Perused, and accompanied now with a treatise tending to pacification: by Edmund Bunny |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
At Oxford, : By Ioseph Barnes printer to the famous Vniuersitie, 1585 |
|
|
|
|
|
|
|
Descrizione fisica |
|
[24], 390, [4], 113, [1] p. : fold. table |
|
|
|
|
|
|
Altri autori (Persone) |
|
BunnyEdmund <1540-1619.> |
ParsonsRobert <1546-1610.> |
|
|
|
|
|
|
|
|
Soggetti |
|
Christian life - Protestant authors |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
R.P. = Robert Parsons. |
A Protestant adaptation, by Edmund Bunny, of: Parsons, Robert. The first booke of the Christian exercise. Parsons' work was revised and enlarged in 1585 as: A Christian directory. |
Title page line 7: "in deed: by". Presumably most of the "Oxford" editions are London forgeries--STC. |
Includes Edmund Bunny's "A treatise tending to pacification", which has a divisional title page and separate pagination; register is continuous. |
Identified as STC 19360a on UMI microfilm. |
Part 1: pages 100, 193, and 386 misnumbered 110, 213 and 382; part 2: page 29 misnumbered 32. |
Reproductions of the originals in the Folger Shakespeare Library. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910635396903321 |
|
|
Autore |
Tehranipoor Mohammad H. <1974-> |
|
|
Titolo |
Hardware Security Primitives / / by Mark Tehranipoor, Nitin Pundir, Nidish Vashistha, Farimah Farahmandi |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2023.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (356 pages) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
|
|
Soggetti |
|
Electronic circuits |
Electronic circuit design |
Microprocessors |
Computer architecture |
Electronic Circuits and Systems |
Electronics Design and Verification |
Processor Architectures |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Introduction -- Hardware Security Primitives and their Applications -- Racetrack PUF -- TERO PUF -- Direct Characterization PUF -- Volatile Memory Based PUF -- Emerging Memory Based PUF -- Extrinsic Characterization of PUF -- Radio PUFs and CoAs -- Optical PUFs -- True Random Number Generators -- Hardware Camouflaging -- Temper Detection Methods -- Embedded Watermarking -- Counterfeit and Recycled IC Detection -- Package-Level Counterfeit IC Detection -- Side Channels Protection in Cryptographic Hardware -- Fault Injection Resistant Cryptographic Hardware -- Energy and Performance Optimization for Cryptography -- Lightweight Cryptography -- Post-Quantum Cryptography -- Virtual Proof of Reality -- Analog Security. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book provides an overview of current hardware security primitives, their design considerations, and applications. The authors provide a comprehensive introduction to a broad spectrum (digital and analog) of hardware security primitives and their applications for securing modern |
|
|
|
|
|
|
|
|
|
|
devices. Readers will be enabled to understand the various methods for exploiting intrinsic manufacturing and temporal variations in silicon devices to create strong security primitives and solutions. This book will benefit SoC designers and researchers in designing secure, reliable, and trustworthy hardware. Provides guidance and security engineers for protecting their hardware designs; Covers a variety digital and analog hardware security primitives and applications for securing modern devices; Helps readers understand PUF, TRNGs, silicon odometer, and cryptographic hardware design for system security. |
|
|
|
|
|
| |