A practical guide to trusted computing /
Clasificación: | Libro Electrónico |
---|---|
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Upper Saddle River, N.J. :
IBM Press/Pearson plc,
©2008.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- pt. I. Background Material
- Ch. 1. Introduction to Trusted Computing
- Ch. 2. Design Goals of the Trusted Platform Module
- Ch. 3. An Overview of the Trusted Platform Module Capabilities
- pt. II. Programming Interfaces to TCG
- Ch. 4. Writing a TPM Device Driver
- Ch. 5. Low-Level Software: Using BIOS and TDDL Directly
- Ch. 6. Trusted Boot
- Ch. 7. The TCG Software Stack
- Ch. 8. Using TPM Keys
- Ch. 9. Using Symmetric Keys
- Ch. 10. The TSS Core Service (TCS)
- Ch. 11. Public Key Cryptography Standard #11
- pt. III. Architectures
- Ch. 12. Trusted Computing and Secure Storage
- Ch. 13. Trusted Computing and Secure Identification
- Ch. 14. Administration of Trusted Devices
- Ch. 15. Ancillary Hardware
- Ch. 16. Moving from TSS 1.1 to TSS 1.2
- pt. IV. Appendixes
- App. A. TPM Command Reference
- App. B. TSS Command Reference
- App. C. Function Library
- App. D. TSS Functions Grouped by Object and API Level.