8.5.2 Embedded Characteristics
- Permission for Each Peripheral Access is Controlled by a Dedicated Security Bit
The online versions of the documents are provided as a courtesy. Verify all content and data in the device’s PDF documentation found on the device product page.