ARM Security Technology Building a Secure System using ...
ARM Security Technology Building a Secure System using ...
ARM Security Technology Building a Secure System using ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Preface<br />
Further reading<br />
<strong>ARM</strong> publications<br />
External publications<br />
This section lists publications from both <strong>ARM</strong> Limited and third parties that provide<br />
additional information.<br />
<strong>ARM</strong> periodically provides updates and corrections to its documentation. See<br />
http://infocenter.arm.com for the latest versions of the Technical Reference Manuals,<br />
User Guides, and the <strong>ARM</strong> Frequently Asked Questions list.<br />
Refer to the following publications from <strong>ARM</strong> Limited:<br />
<strong>ARM</strong> Architecture Reference Manual <strong>ARM</strong> ® v7-A and <strong>ARM</strong> ® v7-R edition<br />
(<strong>ARM</strong> DDI 0406)<br />
Refer to the following publications from third parties:<br />
Trusted Computing Group: Securing Mobile Devices on Converged Networks<br />
https://www.trustedcomputinggroup.org/groups/mobile/Final_iGR_mobile_security_white_paper_sept_2006.pdf<br />
Reuters UK: R u getting the msg about stolen mobiles?<br />
http://uk.reuters.com/article/domesticNews/idUKL2175341320070621<br />
US Department of Transportation: The Incidence Rate of Odometer Fraud<br />
http://www.nhtsa.dot.gov/cars/rules/regrev/evaluate/pdf/809441.pdf<br />
Washington Post: Lost a BlackBerry? Data Could Open a <strong>Security</strong> Breach<br />
http://www.washingtonpost.com/wp-dyn/content/article/2005/07/24/AR2005072401135.html<br />
Securing Java, G. McGraw and E. Felten<br />
http://www.securingjava.com<br />
x Copyright © 2005-2009 <strong>ARM</strong> Limited. All rights reserved. PRD29-GENC-009492C<br />
Non-Confidential Unrestricted Access