Part 2: Design Components
In this part, we’ll dive deeply into security-related activities for your appliance while getting hands-on with advanced Linux configurations and security technologies in your lab.
This part has the following chapters:
- Chapter 5, Basic Needs in My Build Chain
- Chapter 6, Disk Encryption
- Chapter 7, The Trusted Platform Module
- Chapter 8, Boot, BIOS, and Firmware Security
- Chapter 9, Image-Based Deployments
- Chapter 10, Childproofing the Solution: Protection from the End-User and Their Environment