|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
EBOOKCENTRAL_on1020032345 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr |n|---||||| |
008 |
180120s2017 mau ob 001 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d OCLCO
|d DEGRU
|d OCLCQ
|d CUY
|d OCLCO
|d ZCU
|d MERUC
|d ICG
|d OCLCF
|d DKC
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCL
|
020 |
|
|
|a 9783110477597
|
020 |
|
|
|a 3110477599
|
020 |
|
|
|z 9783110476040
|
020 |
|
|
|z 9783110476095
|q (EPUB)
|
035 |
|
|
|a (OCoLC)1020032345
|
050 |
|
4 |
|a QA76.9.A25
|b .T787 2018
|
082 |
0 |
4 |
|a 004
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Feng, Dengguo.
|
245 |
1 |
0 |
|a Trusted Computing :
|b Principles and Applications.
|
260 |
|
|
|a Berlin/Boston :
|b De Gruyter,
|c 2017.
|
300 |
|
|
|a 1 online resource (314 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Advances in Computer Science
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Intro; Preface; Contents; 1. Introduction; 2. Trusted Platform Module; 3. Building Chain of Trust; 4. Trusted Software Stack; 5. Trusted Computing Platform; 6. Test and Evaluation of Trusted Computing; 7. Remote Attestation; 8. Trust Network Connection; Appendix A: Foundations of Cryptography; References; Index.
|
504 |
|
|
|a Includes bibliographical references and index.
|
520 |
|
|
|a The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Information technology
|x Security measures.
|
650 |
|
0 |
|a Information technology
|x Management.
|
650 |
|
6 |
|a Technologie de l'information
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Technologie de l'information
|x Gestion.
|
650 |
|
7 |
|a COMPUTERS / Security / Networking.
|2 bisacsh
|
650 |
|
7 |
|a Information technology
|x Management
|2 fast
|
650 |
|
7 |
|a Information technology
|x Security measures
|2 fast
|
700 |
1 |
|
|a Press, Tsinghua University.
|
758 |
|
|
|i has work:
|a Trusted computing (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCGTrccdrbRxfmJXhbqG9rC
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Feng, Dengguo.
|t Trusted Computing : Principles and Applications.
|d Berlin/Boston : De Gruyter, ©2017
|z 9783110476040
|
830 |
|
0 |
|a Advances in computer science.
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=5157487
|z Texto completo
|
936 |
|
|
|a BATCHLOAD
|
938 |
|
|
|a De Gruyter
|b DEGR
|n 9783110477597
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL5157487
|
994 |
|
|
|a 92
|b IZTAP
|