Description |
1 online resource (1 volume) : illustrations |
Series |
The expert's voice in secure computing |
|
Expert's voice in secure computing.
|
Note |
Includes index. |
|
Place of publication taken from publisher's Web site. |
Bibliography |
Includes bibliographical references and index. |
Summary |
This book shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. It explains security concepts; describes the TPM 2.0 architecture and provides code and pseudo-code examples in parallel, from very simple concepts and code to highly complex concepts and pseudo-code; and includes instructions for the available execution environments and real code examples to get readers up and talking to the TPM quickly. You will learn: TPM 2.0 architecture fundamentals, including changes from TPM 1.2; TPM 2.0 security concepts; essential application development techniques; features of TPM 2.0; execution environments available for application development. -- Edited summary from book. |
Language |
English. |
Subject |
Computer security.
|
|
Data encryption (Computer science)
|
|
Computer networks -- Security measures.
|
|
Sécurité informatique. |
|
Chiffrement (Informatique) |
|
Réseaux d'ordinateurs -- Sécurité -- Mesures. |
|
Coding theory & cryptology. |
|
Software Engineering. |
|
Computer security. |
|
Computer networks -- Security measures |
|
Computer security |
|
Data encryption (Computer science) |
Added Author |
Challener, David, author.
|
|
Goldman, Kenneth, author.
|
Added Title |
Using the Trusted Platform Module in the new age of security |
Other Form: |
1430265833 |
ISBN |
9781430265849 |
|
1430265841 |
|
1430265833 |
|
9781430265832 |
Standard No. |
10.1007/978-1-4302-6584-9. doi |
|