Cargando…

Trusted Computing : Principles and Applications.

The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Feng, Dengguo
Otros Autores: Press, Tsinghua University
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin/Boston : De Gruyter, 2017.
Colección:Advances in computer science.
Temas:
Acceso en línea:Texto completo