Secure Boot Encryption with Linux: Implementation for Embedded Developers (Apress Pocket Guides) First Edition

★★★★★ 4.6 144 reviews

$47.49
Price when purchased online
Free shipping Free 30-day returns

Sold and shipped by texaspool.org
We aim to show you accurate product information. Manufacturers, suppliers and others provide what you see here.
$47.49
Price when purchased online
Free shipping Free 30-day returns

How do you want your item?
You get 30 days free! Choose a plan at checkout.
Shipping
Arrives May 10
Free
Pickup
Check nearby
Delivery
Not available

Sold and shipped by texaspool.org
Free 30-day returns Details

Product details

Management number 219223736 Release Date 2026/05/03 List Price $19.00 Model Number 219223736
Category

Secure Boot Encryption with Linux serves as a quick guide to building and maintaining a secure, embedded Linux system by establishing a verifiable Chain-of-Trust from the moment power is applied until the first user space application takes control. It meticulously breaks down what the Secure Boot implementation is, and critically, what it is not by providing the technical knowledge necessary to guard against sophisticated rootkits and unauthorized code execution.We begin by dissecting the Linux Cryptographic Subsystem and the core mechanism for secret protection: the Linux Key-Management Facility (Keyring). It provides an in-depth, practical guide to implementing Trusted Keys and Encrypted Keys, detailing how these secrets are secured by tying them to specialized hardware like the Trusted Platform Module (TPM). This unique focus ensures that critical encryption and signing keys are never exposed to user space, neutralizing the impact of successful root- level exploits. Next, we explore the implementation of a full Secure Boot Chain-of-Trust. Readers will learn how the Chain-of-Trust works from the initial pre-bootloader (e.g., U-Boot SPL or the Arm Trusted Firmware), through the main bootloader, up to the kernel and the root filesystem. This process guarantees that only code signed by a trusted authority is executed, providing unparalleled protection against firmware injection and persistent bootkits. we finish by looking at a blue print for Secure System Lifecycle Management, integrating the kernel's key-management with Transparent Encryption (dm-crypt) for the root filesystem and detailing the procedures for maintaining security over time. By focusing on root- proof key management and end-to-end integrity enforcement, this pocket guide is essential reading for developers and security archtects who need to build resilient Linux products that meet the highest standards of modern cybersecurity.You Will Learn:How to implement and manage cryptographic secrets using the Linux Key-Management Facility (Keyring)Understand how to use the Linux Crypto API for secure hashing, signing, and encryption operationsHow to establish an unbreakable Chain-of-Trust that verifies the integrity and authenticity of every system component, from the initial hardware Root-of-Trust and the pre-bootloader to the final Linux kernel load.How to achieve Transparent Full Disk Encryption by integrating the secure Keyring with key technologies for data confidentiality for OS and Kernel levelsThis Book is for:Experienced embedded Linux developers and security architects Read more

ISBN13 979-8868828171
Edition First Edition
Language English
Publisher Apress
Item Weight 1.11 pounds
Publication date October 11, 2026

Correction of product information

If you notice any omissions or errors in the product information on this page, please use the correction request form below.

Correction Request Form

Customer ratings & reviews

4.6 out of 5
★★★★★
144 ratings | 59 reviews
How item rating is calculated
View all reviews
5 stars
84% (121)
4 stars
3% (4)
3 stars
2% (3)
2 stars
1% (1)
1 star
10% (14)
Sort by

There are currently no written reviews for this product.