Cargando…

Trusted computing : principles and applications /

The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Feng, Dengguo (Autor), Qin, Yu (Autor), Chu, Xiaobo (Autor), Zhao, Shijun (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin : De Gruyter, [2018]
Colección:Advances in computer science ; volume 2.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBSCO_on1020288747
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 180124s2018 gw a ob 001 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d UMI  |d CNCGM  |d YDX  |d N$T  |d OCLCF  |d OCLCQ  |d LOA  |d COCUF  |d UKAHL  |d QGK  |d OCLCQ  |d OCLCO  |d K6U  |d OCLCQ  |d SFB 
020 |a 9783110477603  |q (electronic bk.) 
020 |a 3110477602  |q (electronic bk.) 
020 |a 9783110477597  |q (electronic bk.) 
020 |a 3110477599  |q (electronic bk.) 
020 |z 9783110476040 
020 |z 3110476045 
020 |z 9783110476095 
020 |z 3110476096 
029 1 |a AU@  |b 000062599583 
035 |a (OCoLC)1020288747 
037 |a CL0500000932  |b Safari Books Online 
050 4 |a T58.64 
072 7 |a COM  |x 032000  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Feng, Dengguo,  |e author. 
245 1 0 |a Trusted computing :  |b principles and applications /  |c Dengguo Feng, Yu Qin, Xiaobo Chu, Shijun Zhao. 
264 1 |a Berlin :  |b De Gruyter,  |c [2018] 
264 4 |c ©2018 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Advances in computer science ;  |v volume 2 
588 0 |a Online resource; title from PDF title page (EBSCO, viewed February 27, 2018) 
504 |a Includes bibliographical references and index. 
505 0 0 |t Frontmatter --  |t Preface --  |t Contents --  |t 1. Introduction --  |t 2. Trusted Platform Module --  |t 3. Building Chain of Trust --  |t 4. Trusted Software Stack --  |t 5. Trusted Computing Platform --  |t 6. Test and Evaluation of Trusted Computing --  |t 7. Remote Attestation --  |t 8. Trust Network Connection --  |t Appendix A: Foundations of Cryptography --  |t References --  |t Index 
520 |a The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Information technology  |x Security measures. 
650 0 |a Information technology  |x Management. 
650 6 |a Technologie de l'information  |x Sécurité  |x Mesures. 
650 6 |a Technologie de l'information  |x Gestion. 
650 7 |a COMPUTERS  |x Information Technology.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Information technology  |x Management.  |2 fast  |0 (OCoLC)fst00973112 
650 7 |a Information technology  |x Security measures.  |2 fast  |0 (OCoLC)fst00973129 
700 1 |a Qin, Yu,  |e author. 
700 1 |a Chu, Xiaobo,  |e author. 
700 1 |a Zhao, Shijun,  |e author. 
830 0 |a Advances in computer science ;  |v volume 2. 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1670218  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH31988471 
938 |a Askews and Holts Library Services  |b ASKH  |n AH35151799 
938 |a EBSCOhost  |b EBSC  |n 1670218 
938 |a YBP Library Services  |b YANK  |n 12862700 
938 |a YBP Library Services  |b YANK  |n 13158311 
994 |a 92  |b IZTAP