|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
EBSCO_on1020288747 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
180124s2018 gw a ob 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d UMI
|d CNCGM
|d YDX
|d N$T
|d OCLCF
|d OCLCQ
|d LOA
|d COCUF
|d UKAHL
|d QGK
|d OCLCQ
|d OCLCO
|d K6U
|d OCLCQ
|d SFB
|
020 |
|
|
|a 9783110477603
|q (electronic bk.)
|
020 |
|
|
|a 3110477602
|q (electronic bk.)
|
020 |
|
|
|a 9783110477597
|q (electronic bk.)
|
020 |
|
|
|a 3110477599
|q (electronic bk.)
|
020 |
|
|
|z 9783110476040
|
020 |
|
|
|z 3110476045
|
020 |
|
|
|z 9783110476095
|
020 |
|
|
|z 3110476096
|
029 |
1 |
|
|a AU@
|b 000062599583
|
035 |
|
|
|a (OCoLC)1020288747
|
037 |
|
|
|a CL0500000932
|b Safari Books Online
|
050 |
|
4 |
|a T58.64
|
072 |
|
7 |
|a COM
|x 032000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Feng, Dengguo,
|e author.
|
245 |
1 |
0 |
|a Trusted computing :
|b principles and applications /
|c Dengguo Feng, Yu Qin, Xiaobo Chu, Shijun Zhao.
|
264 |
|
1 |
|a Berlin :
|b De Gruyter,
|c [2018]
|
264 |
|
4 |
|c ©2018
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Advances in computer science ;
|v volume 2
|
588 |
0 |
|
|a Online resource; title from PDF title page (EBSCO, viewed February 27, 2018)
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
0 |
|t Frontmatter --
|t Preface --
|t Contents --
|t 1. Introduction --
|t 2. Trusted Platform Module --
|t 3. Building Chain of Trust --
|t 4. Trusted Software Stack --
|t 5. Trusted Computing Platform --
|t 6. Test and Evaluation of Trusted Computing --
|t 7. Remote Attestation --
|t 8. Trust Network Connection --
|t Appendix A: Foundations of Cryptography --
|t References --
|t Index
|
520 |
|
|
|a The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Information technology
|x Security measures.
|
650 |
|
0 |
|a Information technology
|x Management.
|
650 |
|
6 |
|a Technologie de l'information
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Technologie de l'information
|x Gestion.
|
650 |
|
7 |
|a COMPUTERS
|x Information Technology.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Information technology
|x Management.
|2 fast
|0 (OCoLC)fst00973112
|
650 |
|
7 |
|a Information technology
|x Security measures.
|2 fast
|0 (OCoLC)fst00973129
|
700 |
1 |
|
|a Qin, Yu,
|e author.
|
700 |
1 |
|
|a Chu, Xiaobo,
|e author.
|
700 |
1 |
|
|a Zhao, Shijun,
|e author.
|
830 |
|
0 |
|a Advances in computer science ;
|v volume 2.
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1670218
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH31988471
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH35151799
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1670218
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12862700
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 13158311
|
994 |
|
|
|a 92
|b IZTAP
|