|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_ocn908031861 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
150427s2015 nyua ob 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d B24X7
|d COO
|d DEBBG
|d DEBSZ
|d OCLCF
|d LIV
|d OCLCA
|d CEF
|d OCLCQ
|d OCLCO
|d WYU
|d UKMGB
|d UAB
|d BRF
|d HS0
|d SFB
|d OCLCO
|d OCLCQ
|d OCLCO
|
015 |
|
|
|a GBB8M4277
|2 bnb
|
016 |
7 |
|
|a 019139616
|2 Uk
|
019 |
|
|
|a 1165384350
|
020 |
|
|
|a 9781430265849
|
020 |
|
|
|a 1430265841
|
020 |
|
|
|a 1430265833
|
020 |
|
|
|a 9781430265832
|
020 |
|
|
|z 9781430265832
|
024 |
7 |
|
|a 10.1007/978-1-4302-6584-9.
|2 doi
|
029 |
1 |
|
|a DEBBG
|b BV042683242
|
029 |
1 |
|
|a DEBSZ
|b 446584479
|
029 |
1 |
|
|a GBVCP
|b 835873641
|
029 |
1 |
|
|a UKMGB
|b 019139616
|
035 |
|
|
|a (OCoLC)908031861
|z (OCoLC)1165384350
|
037 |
|
|
|a CL0500000582
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a URY.
|2 bicssc
|
072 |
|
7 |
|a COM053000.
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8/2
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Arthur, Will,
|e author.
|
245 |
1 |
2 |
|a A practical guide to TPM 2.0 :
|b using the Trusted Platform Module in the new age of security /
|c Will Arthur, David Challener, with Kenneth Goldman.
|
246 |
3 |
0 |
|a Using the Trusted Platform Module in the new age of security
|
264 |
|
1 |
|a [New York, NY] :
|b ApressOpen,
|c [2015]
|
264 |
|
2 |
|a New York, NY :
|b Distributed to the Book trade worldwide by Springer Science+Media New York
|
264 |
|
4 |
|c ©2015
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a The expert's voice in secure computing
|
588 |
0 |
|
|a Online resource; title from title page (Safari, viewed April 15, 2015).
|
500 |
|
|
|a Includes index.
|
500 |
|
|
|a Place of publication taken from publisher's Web site.
|
504 |
|
|
|a Includes bibliographical references and index.
|
520 |
|
|
|a This book shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. It explains security concepts; describes the TPM 2.0 architecture and provides code and pseudo-code examples in parallel, from very simple concepts and code to highly complex concepts and pseudo-code; and includes instructions for the available execution environments and real code examples to get readers up and talking to the TPM quickly. You will learn: TPM 2.0 architecture fundamentals, including changes from TPM 1.2; TPM 2.0 security concepts; essential application development techniques; features of TPM 2.0; execution environments available for application development. --
|c Edited summary from book.
|
546 |
|
|
|a English.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Chiffrement (Informatique)
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Coding theory & cryptology.
|2 bicssc
|
650 |
|
7 |
|a Software Engineering.
|2 bicssc
|
650 |
|
7 |
|a Computer security.
|2 bicssc
|
650 |
|
7 |
|a Computers
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computers
|x Software Development & Engineering
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Data encryption (Computer science)
|2 fast
|
700 |
1 |
|
|a Challener, David,
|e author.
|
700 |
1 |
|
|a Goldman, Kenneth,
|e author.
|
776 |
0 |
|
|z 1430265833
|
830 |
|
0 |
|a Expert's voice in secure computing.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781430265849/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00081127
|
994 |
|
|
|a 92
|b IZTAP
|