Practical Guide to Trusted Computing , A Ebook Tooltip

Afbeeldingen

Inkijkexemplaar

Artikel vergelijken

  • Engels
  • E-book
  • 9780132704397
  • 27 december 2007
  • 384 pagina's
  • Adobe ePub
Alle productspecificaties
  • Je leest ebooks gemakkelijk op je Kobo e-reader, of op je smartphone of tablet met de bol.com Kobo app. Let op! Ebooks kunnen niet geannuleerd of geretourneerd worden.

Samenvatting

Use Trusted Computing to Make PCs Safer, More Secure, and More Reliable Every year, computer security threats become more severe. Software alone can no longer adequately defend against them: what"s needed is secure hardware. The Trusted Platform Module (TPM) makes that possible by providing a complete, open industry standard for implementing trusted computing hardware subsystems in PCs. Already available from virtually every leading PC manufacturer, TPM gives software professionals powerful new ways to protect their customers. Now, there"s a start-to-finish guide for every software professional and security specialist who wants to utilize this breakthrough security technology. Authored by innovators who helped create TPM and implement its leading-edge products, this practical book covers all facets of TPM technology: what it can achieve, how it works, and how to write applications for it. The authors offer deep, real-world insights into both TPM and the Trusted Computing Group (TCG) Software Stack. Then, to demonstrate how TPM can solve many of today"s most challenging security problems, they present four start-to-finish case studies, each with extensive C-based code examples. Coverage includes What services and capabilities are provided by TPMs TPM device drivers: solutions for code running in BIOS, TSS stacks for new operating systems, and memory-constrained environments Using TPM to enhance the security of a PC"s boot sequence Key management, in depth: key creation, storage, loading, migration, use, symmetric keys, and much more Linking PKCS#11 and TSS stacks to support applications with middleware services What you need to know about TPM and privacy--including how to avoid privacy problems Moving from TSS 1.1 to the new TSS 1.2 standard TPM and TSS command references and a complete function library

Productspecificaties

Inhoud

Taal
en
Bindwijze
E-book
Oorspronkelijke releasedatum
27 december 2007
Aantal pagina's
384
Ebook Formaat
Adobe ePub
Illustraties
Met illustraties

Betrokkenen

Hoofdauteur
David Challener
Tweede Auteur
Kent Yoder
Co Auteur
Ryan Catherman
Hoofduitgeverij
Ibm Press

Vertaling

Originele titel
Challener:Pract Gde Trusted Comp_p1

Lees mogelijkheden

Lees dit ebook op
Android (smartphone en tablet) | Kobo e-reader | Desktop (Mac en Windows) | iOS (smartphone en tablet) | Windows (smartphone en tablet)

Overige kenmerken

Editie
1
Extra groot lettertype
Nee
Product breedte
10 mm
Product hoogte
10 mm
Product lengte
10 mm
Studieboek
Nee
Verpakking hoogte
19 mm

EAN

EAN
9780132704397

Je vindt dit artikel in

Taal
Engels
Studieboek of algemeen
Studieboeken
Boek, ebook of luisterboek?
Ebook
Beschikbaarheid
Leverbaar
Nog geen reviews

Kies gewenste uitvoering

Bindwijze : E-book

Prijsinformatie en bestellen

De prijs van dit product is 20 euro en 99 cent.
Direct beschikbaar
Verkoop door bol
Ebook
  • E-book is direct beschikbaar na aankoop
  • E-books lezen is voordelig
  • Dag en nacht klantenservice
  • Veilig betalen
Houd er rekening mee dat je downloadartikelen niet kunt annuleren of retourneren. Bij nog niet verschenen producten kun je tot de verschijningsdatum annuleren.
Zie ook de retourvoorwaarden