A practical guide to TPM 2.0 : using the Trusted Platform Module in the new age of security /
This book shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. It explains security concepts; describes the TPM 2.0 architecture and provides code and pseudo-code examples in parallel, from very simple concepts and code to highly complex concepts...
Clasificación: | Libro Electrónico |
---|---|
Autores principales: | Arthur, Will (Autor), Challener, David (Autor), Goldman, Kenneth (Autor) |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
[New York, NY] :
ApressOpen,
[2015]
|
Colección: | Expert's voice in secure computing.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Ejemplares similares
-
Cryptography and network security /
por: Bose, S., et al.
Publicado: (2016) -
Application security in the ISO 27001:2013 environment /
por: Vasudevan, Vinod, et al.
Publicado: (2015) -
Security, Privacy and Reliability in Computer Communications and Networks
por: Sha, Kewei
Publicado: (2017) -
Cryptography and network security /
Publicado: (2012) -
Application security in the ISO 27001:2013 environment /
por: Vasudevan, Vinod, et al.
Publicado: (2015)