Trusted Computing Platforms: TPM2.0 in Context

Trusted Computing Platforms: TPM2.0 in Context

English | 2015 | ISBN: 3319087436, 3319356909 | 382 Pages | PDF | 2,7 MB

In this book the authors first describe the background of trusted platforms and trusted computing and speculate about the future. They then describe the technical features and architectures of trusted platforms from several different perspectives, finally explaining second-generation TPMs, including a technical description intended to supplement the Trusted Computing Group's TPM2 specifications. The intended audience is IT managers and engineers and graduate students in information security.

Download:

http://longfiles.com/ypk3mr3tlux0/Trusted_Computing_Platforms_TPM2.0_in_Context.pdf.html

[Fast Download] Trusted Computing Platforms: TPM2.0 in Context


Related eBooks:
Trusted Computing for Embedded Systems
Introduction to Threat Intelligence
Financial Cryptography and Data Security: 23rd International Conference, FC 2019, Frigate Bay, St. K
IT Security Foundations: Core Concepts [Released 10/11/2019]
The secure information society: ethical, legal and political challenges
Security and Privacy for Big Data, Cloud Computing and Applications
Nmap: Network Exploration and Security Auditing Cookbook - Second Edition
Disassembling Code IDA Pro And SoftICE
The Art of Computer Virus Research and Defense
Computer Security -- ESORICS 2015, Part I
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Physical Layer Security in Wireless Communications
Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.