Cargando…

Trusted Computing : Principles and Applications.

The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Feng, Dengguo
Otros Autores: Press, Tsinghua University
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin/Boston : De Gruyter, 2017.
Colección:Advances in computer science.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBOOKCENTRAL_on1020032345
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|---|||||
008 180120s2017 mau ob 001 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d OCLCO  |d DEGRU  |d OCLCQ  |d CUY  |d OCLCO  |d ZCU  |d MERUC  |d ICG  |d OCLCF  |d DKC  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
020 |a 9783110477597 
020 |a 3110477599 
020 |z 9783110476040 
020 |z 9783110476095  |q (EPUB) 
035 |a (OCoLC)1020032345 
050 4 |a QA76.9.A25  |b .T787 2018 
082 0 4 |a 004 
049 |a UAMI 
100 1 |a Feng, Dengguo. 
245 1 0 |a Trusted Computing :  |b Principles and Applications. 
260 |a Berlin/Boston :  |b De Gruyter,  |c 2017. 
300 |a 1 online resource (314 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Advances in Computer Science 
588 0 |a Print version record. 
505 0 |a Intro; Preface; Contents; 1. Introduction; 2. Trusted Platform Module; 3. Building Chain of Trust; 4. Trusted Software Stack; 5. Trusted Computing Platform; 6. Test and Evaluation of Trusted Computing; 7. Remote Attestation; 8. Trust Network Connection; Appendix A: Foundations of Cryptography; References; Index. 
504 |a Includes bibliographical references and index. 
520 |a The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Information technology  |x Security measures. 
650 0 |a Information technology  |x Management. 
650 6 |a Technologie de l'information  |x Sécurité  |x Mesures. 
650 6 |a Technologie de l'information  |x Gestion. 
650 7 |a COMPUTERS / Security / Networking.  |2 bisacsh 
650 7 |a Information technology  |x Management  |2 fast 
650 7 |a Information technology  |x Security measures  |2 fast 
700 1 |a Press, Tsinghua University. 
758 |i has work:  |a Trusted computing (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGTrccdrbRxfmJXhbqG9rC  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Feng, Dengguo.  |t Trusted Computing : Principles and Applications.  |d Berlin/Boston : De Gruyter, ©2017  |z 9783110476040 
830 0 |a Advances in computer science. 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=5157487  |z Texto completo 
936 |a BATCHLOAD 
938 |a De Gruyter  |b DEGR  |n 9783110477597 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL5157487 
994 |a 92  |b IZTAP