|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-319-08744-3 |
003 |
DE-He213 |
005 |
20220115215221.0 |
007 |
cr nn 008mamaa |
008 |
150108s2014 sz | s |||| 0|eng d |
020 |
|
|
|a 9783319087443
|9 978-3-319-08744-3
|
024 |
7 |
|
|a 10.1007/978-3-319-08744-3
|2 doi
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
100 |
1 |
|
|a Proudler, Graeme.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Trusted Computing Platforms
|h [electronic resource] :
|b TPM2.0 in Context /
|c by Graeme Proudler, Liqun Chen, Chris Dalton.
|
250 |
|
|
|a 1st ed. 2014.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2014.
|
300 |
|
|
|a XVIII, 382 p. 9 illus., 2 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a Introduction to Trusted Computing -- Futures for Trusted Computing -- Basics of Trusted Platforms -- Trusted Platform Architecture -- TPM2 Requirements -- TPM2 Operation -- Initialising TPM2 -- Managing TPM2 -- Accessing Keys and Data in TPM2 -- Customer Configuration of TPM2 and Its Host Platform -- Starting to Use TPM2 -- Direct Anonymous Attestation (DAA) in More Depth -- Machine Virtualisation, Virtual Machines, and TPMs -- Index.
|
520 |
|
|
|a In this book the authors first describe the background of trusted platforms and trusted computing, and speculate about the future. They then describe the technical features and architectures of trusted platforms from several different perspectives, finally explaining second-generation TPMs, including a technical description intended to supplement the Trusted Computing Group's TPM2 specifications. The intended audience is IT managers and engineers, and graduate students in information security.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Telecommunication.
|
650 |
|
0 |
|a Security systems.
|
650 |
1 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Communications Engineering, Networks.
|
650 |
2 |
4 |
|a Security Science and Technology.
|
700 |
1 |
|
|a Chen, Liqun.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
700 |
1 |
|
|a Dalton, Chris.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319087436
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319087450
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319356907
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-319-08744-3
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|