Trusted computing : principles and applications /
The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending...
Clasificación: | Libro Electrónico |
---|---|
Autores principales: | Feng, Dengguo (Autor), Qin, Yu (Autor), Chu, Xiaobo (Autor), Zhao, Shijun (Autor) |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin :
De Gruyter,
[2018]
|
Colección: | Advances in computer science ;
volume 2. |
Temas: | |
Acceso en línea: | Texto completo |
Ejemplares similares
-
Trusted Computing : Principles and Applications.
por: Feng, Dengguo
Publicado: (2017) -
The value of operations security /
Publicado: (2016) -
Security automation with Ansible 2 : leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis /
por: Akula, Madhu, et al.
Publicado: (2017) -
Security automation with Ansible 2 : leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis /
por: Akula, Madhu, et al.
Publicado: (2017) -
Ansible quick start guide : Control and monitor infrastructures of any size, physical or virtual /
por: Alibi, Mohamed
Publicado: (2018)