|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn226860503 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
080501s2008 njua ob 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d OCLCQ
|d TXJ
|d CEF
|d OCLCQ
|d COCUF
|d NHM
|d OCLCE
|d B24X7
|d DEBSZ
|d BDX
|d OCLCQ
|d OCLCF
|d OCLCQ
|d OCLCO
|d OCLCQ
|d YDX
|d OCLCA
|d AU@
|d COO
|d WYU
|d VT2
|d LDP
|d HS0
|d EYM
|d UKAHL
|d LVT
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 192094242
|a 213380828
|a 747117418
|a 762007505
|a 1044298452
|a 1056317111
|a 1058072152
|a 1060197906
|a 1060792746
|a 1062864244
|a 1074313030
|a 1083197168
|a 1103265471
|a 1104432221
|a 1156935336
|a 1180314304
|a 1194813986
|a 1202556207
|a 1227702112
|a 1240530715
|a 1302274219
|
020 |
|
|
|a 9780132398428
|
020 |
|
|
|a 0132398427
|
020 |
|
|
|a 0132704390
|
020 |
|
|
|a 9780132704397
|
020 |
|
|
|a 9780137135585
|q (online)
|
020 |
|
|
|a 0137135580
|
029 |
1 |
|
|a AU@
|b 000053248955
|
029 |
1 |
|
|a CHBIS
|b 006148041
|
029 |
1 |
|
|a CHVBK
|b 171435915
|
029 |
1 |
|
|a DEBSZ
|b 355398397
|
029 |
1 |
|
|a HEBIS
|b 291471498
|
029 |
1 |
|
|a AU@
|b 000073551108
|
035 |
|
|
|a (OCoLC)226860503
|z (OCoLC)192094242
|z (OCoLC)213380828
|z (OCoLC)747117418
|z (OCoLC)762007505
|z (OCoLC)1044298452
|z (OCoLC)1056317111
|z (OCoLC)1058072152
|z (OCoLC)1060197906
|z (OCoLC)1060792746
|z (OCoLC)1062864244
|z (OCoLC)1074313030
|z (OCoLC)1083197168
|z (OCoLC)1103265471
|z (OCoLC)1104432221
|z (OCoLC)1156935336
|z (OCoLC)1180314304
|z (OCoLC)1194813986
|z (OCoLC)1202556207
|z (OCoLC)1227702112
|z (OCoLC)1240530715
|z (OCoLC)1302274219
|
037 |
|
|
|a CL0500000021
|b Safari Books Online
|
042 |
|
|
|a dlr
|
050 |
|
4 |
|a TK7895.E42
|b P73 2008
|
082 |
0 |
4 |
|a 005.8
|2 22
|
084 |
|
|
|a DAT 460f
|2 stub
|
049 |
|
|
|a UAMI
|
245 |
0 |
2 |
|a A practical guide to trusted computing /
|c David Challener [and others].
|
260 |
|
|
|a Upper Saddle River, N.J. :
|b IBM Press/Pearson plc,
|c ©2008.
|
300 |
|
|
|a 1 online resource (xxviii, 347 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a pt. I. Background Material -- Ch. 1. Introduction to Trusted Computing -- Ch. 2. Design Goals of the Trusted Platform Module -- Ch. 3. An Overview of the Trusted Platform Module Capabilities -- pt. II. Programming Interfaces to TCG -- Ch. 4. Writing a TPM Device Driver -- Ch. 5. Low-Level Software: Using BIOS and TDDL Directly -- Ch. 6. Trusted Boot -- Ch. 7. The TCG Software Stack -- Ch. 8. Using TPM Keys -- Ch. 9. Using Symmetric Keys -- Ch. 10. The TSS Core Service (TCS) -- Ch. 11. Public Key Cryptography Standard #11 -- pt. III. Architectures -- Ch. 12. Trusted Computing and Secure Storage -- Ch. 13. Trusted Computing and Secure Identification -- Ch. 14. Administration of Trusted Devices -- Ch. 15. Ancillary Hardware -- Ch. 16. Moving from TSS 1.1 to TSS 1.2 -- pt. IV. Appendixes -- App. A. TPM Command Reference -- App. B. TSS Command Reference -- App. C. Function Library -- App. D. TSS Functions Grouped by Object and API Level.
|
506 |
|
|
|3 Use copy
|f Restrictions unspecified
|2 star
|5 MiAaHDL
|
533 |
|
|
|a Electronic reproduction.
|b [Place of publication not identified] :
|c HathiTrust Digital Library,
|d 2011.
|5 MiAaHDL
|
538 |
|
|
|a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
|u http://purl.oclc.org/DLF/benchrepro0212
|5 MiAaHDL
|
583 |
1 |
|
|a digitized
|c 2011
|h HathiTrust Digital Library
|l committed to preserve
|2 pda
|5 MiAaHDL
|
546 |
|
|
|a English.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Embedded computer systems.
|
650 |
|
0 |
|a Programmable controllers.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Systèmes enfouis (Informatique)
|
650 |
|
6 |
|a Automates programmables.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Embedded computer systems.
|2 blmlsh
|
650 |
|
7 |
|a Programmable controllers.
|2 blmlsh
|
650 |
|
7 |
|a Computer security.
|2 blmlsh
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Embedded computer systems
|2 fast
|
650 |
|
7 |
|a Programmable controllers
|2 fast
|
650 |
|
7 |
|a Trusted Computing
|2 gnd
|
650 |
|
7 |
|a Freeware
|2 gnd
|
650 |
|
7 |
|a Computersicherheit
|2 gnd
|
700 |
1 |
|
|a Challener, David.
|
776 |
0 |
8 |
|i Print version:
|t Practical guide to trusted computing.
|d Upper Saddle River, N.J. : IBM Press/Pearson plc, ©2008
|w (DLC) 2007038929
|w (OCoLC)144223560
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780132398428/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH38081947
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00024463
|
938 |
|
|
|a Brodart
|b BROD
|n 07544650
|c $49.99
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 14858191
|
994 |
|
|
|a 92
|b IZTAP
|