81,95 €
81,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
41 °P sammeln
81,95 €
81,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
41 °P sammeln
Als Download kaufen
81,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
41 °P sammeln
Jetzt verschenken
81,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
41 °P sammeln
  • Format: PDF

This timely and exhaustive study offers a much-needed examination of the scope and consequences of the electronic counterfeit trade. The authors describe a variety of shortcomings and vulnerabilities in the electronic component supply chain, which can result in counterfeit integrated circuits (ICs). Not only does this book provide an assessment of the current counterfeiting problems facing both the public and private sectors, it also offers practical, real-world solutions for combatting this substantial threat.
· Helps beginners and practitioners in the field by providing a comprehensive
…mehr

Produktbeschreibung
This timely and exhaustive study offers a much-needed examination of the scope and consequences of the electronic counterfeit trade. The authors describe a variety of shortcomings and vulnerabilities in the electronic component supply chain, which can result in counterfeit integrated circuits (ICs). Not only does this book provide an assessment of the current counterfeiting problems facing both the public and private sectors, it also offers practical, real-world solutions for combatting this substantial threat.

· Helps beginners and practitioners in the field by providing a comprehensive background on the counterfeiting problem;

· Presents innovative taxonomies for counterfeit types, test methods, and counterfeit defects, which allows for a detailed analysis of counterfeiting and its mitigation;

· Provides step-by-step solutions for detecting different types of counterfeit ICs;

· Offers pragmatic and practice-oriented, realistic solutions to counterfeit IC detection and avoidance, for industry and government.


Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

Autorenporträt
Mark (Mohammad) Tehranipoor is currently the Charles H. Knapp Associate Professor of Electrical and Computer Engineering Department at the University of Connecticut.

His current research projects include: computer-aided design and test for CMOS VLSI designs, hardware security and trust, counterfeit IC detection and prevention, and reliable systems design at nanoscale. Prof. Tehranipoor has published over 200 journal articles and refereed conference papers and has given more than 125 invited talks and keynote addresses since 2006. In addition, he has published five books and ten book chapters. His projects are sponsored by both the industry (SRC, Texas Instruments, Freescale, Comcast, Honeywell, LSI, Mentor Graphics, Cisco, Qualcomm, MediaTeck, etc.) and Government (NSF, ARO, MDA, DOD, DOE, etc.).

He is a recipient of several best paper awards, the 2008 IEEE Computer Society (CS) Meritorious Service Award, the 2012 IEEE CS Outstanding Contribution, the 2010 IEEE CS Most Successful Technical Event for co-founding and chairing HOST Symposium, the 2009 NSF CAREER Award, the 2009 UConn ECE Research Excellence Award, and the 2012 UConn SOE Outstanding Faculty Advisor Award.

He serves on the program committee of more than a dozen leading conferences and workshops. Prof. Tehranipoor served as the guest editor for JETTA, IEEE Design and Test of Computers, and IEEE Computer Society Computing Now. He served as Program Chair of the 2007 IEEE Defect-Based Testing (DBT) workshop, Program Chair of the 2008 IEEE Defect and Data Driven Testing (D3T) workshop, Co-program Chair of the 2008 International Symposium on Defect and Fault Tolerance in VLSI Systems (DFTS), General Chair for D3T-2009 and DFTS-2009, and Vice-general Chair for NATW-2011.

He co-founded a new symposium called IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) ()http://www.engr.uconn.edu/HOST/) and served as HOST-2008 and HOST-2009 General Chair and continue to serve as Chair of Steering Committee for HOST. He is also a co-founder of Trust-Hub (www.trust-hub.org). He is currently serving as the Associate Editor-in-Chief (EIC) for IEEE Design and Test of Computers, an Associate Editor for JETTA, an Associate Editor for Journal of Low Power Electronics (JOLPE), an Associate Editor for ACM Transactions for Design Automation of Electronic Systems (TODAES), an IEEE Distinguished Speaker, and an ACM Distinguished Speaker.

Prof. Tehranipoor is a Senior Member of the IEEE, Golden Core Member of IEEE Computer Society, and Member of ACM and ACM SIGDA.

Rezensionen
"In this book, the authors present an overall description of the physical and electrical techniques that are used in the state of the art. Those techniques are proven to be useful in the practical detection and avoidance of counterfeit ICs. ... usable as a handbook for engineers and experts in this field." (Zheng Gong, computing Reviews, August, 2015)