Cargando…

A practical guide to TPM 2.0 : using the Trusted Platform Module in the new age of security /

This book shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. It explains security concepts; describes the TPM 2.0 architecture and provides code and pseudo-code examples in parallel, from very simple concepts and code to highly complex concepts...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Arthur, Will (Autor), Challener, David (Autor), Goldman, Kenneth (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [New York, NY] : ApressOpen, [2015]
Colección:Expert's voice in secure computing.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_ocn908031861
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 150427s2015 nyua ob 001 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d B24X7  |d COO  |d DEBBG  |d DEBSZ  |d OCLCF  |d LIV  |d OCLCA  |d CEF  |d OCLCQ  |d OCLCO  |d WYU  |d UKMGB  |d UAB  |d BRF  |d HS0  |d SFB  |d OCLCO  |d OCLCQ  |d OCLCO 
015 |a GBB8M4277  |2 bnb 
016 7 |a 019139616  |2 Uk 
019 |a 1165384350 
020 |a 9781430265849 
020 |a 1430265841 
020 |a 1430265833 
020 |a 9781430265832 
020 |z 9781430265832 
024 7 |a 10.1007/978-1-4302-6584-9.  |2 doi 
029 1 |a DEBBG  |b BV042683242 
029 1 |a DEBSZ  |b 446584479 
029 1 |a GBVCP  |b 835873641 
029 1 |a UKMGB  |b 019139616 
035 |a (OCoLC)908031861  |z (OCoLC)1165384350 
037 |a CL0500000582  |b Safari Books Online 
050 4 |a QA76.9.A25 
072 7 |a URY.  |2 bicssc 
072 7 |a COM053000.  |2 bisacsh 
082 0 4 |a 005.8/2  |2 23 
049 |a UAMI 
100 1 |a Arthur, Will,  |e author. 
245 1 2 |a A practical guide to TPM 2.0 :  |b using the Trusted Platform Module in the new age of security /  |c Will Arthur, David Challener, with Kenneth Goldman. 
246 3 0 |a Using the Trusted Platform Module in the new age of security 
264 1 |a [New York, NY] :  |b ApressOpen,  |c [2015] 
264 2 |a New York, NY :  |b Distributed to the Book trade worldwide by Springer Science+Media New York 
264 4 |c ©2015 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a The expert's voice in secure computing 
588 0 |a Online resource; title from title page (Safari, viewed April 15, 2015). 
500 |a Includes index. 
500 |a Place of publication taken from publisher's Web site. 
504 |a Includes bibliographical references and index. 
520 |a This book shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. It explains security concepts; describes the TPM 2.0 architecture and provides code and pseudo-code examples in parallel, from very simple concepts and code to highly complex concepts and pseudo-code; and includes instructions for the available execution environments and real code examples to get readers up and talking to the TPM quickly. You will learn: TPM 2.0 architecture fundamentals, including changes from TPM 1.2; TPM 2.0 security concepts; essential application development techniques; features of TPM 2.0; execution environments available for application development. --  |c Edited summary from book. 
546 |a English. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Data encryption (Computer science) 
650 0 |a Computer networks  |x Security measures. 
650 6 |a Sécurité informatique. 
650 6 |a Chiffrement (Informatique) 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a Coding theory & cryptology.  |2 bicssc 
650 7 |a Software Engineering.  |2 bicssc 
650 7 |a Computer security.  |2 bicssc 
650 7 |a Computers  |x Security  |x General.  |2 bisacsh 
650 7 |a Computers  |x Software Development & Engineering  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Data encryption (Computer science)  |2 fast 
700 1 |a Challener, David,  |e author. 
700 1 |a Goldman, Kenneth,  |e author. 
776 0 |z 1430265833 
830 0 |a Expert's voice in secure computing. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781430265849/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Books 24x7  |b B247  |n bks00081127 
994 |a 92  |b IZTAP