Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
     
Limit search to available items
Results Page:  Previous Next
Author Pearson, Siani, author.

Title Trusted Computing Platforms: TCPA Technology in Context / Pearson, Siani. [O'Reilly electronic resource]

Edition 1st edition.
Publication Info. [Place of publication not identified] : Pearson, 2002.
QR Code
Description 1 online resource (352 pages).
text file
49.99
Series Hewlett-Packard professional books
Hewlett-Packard professional books.
Summary TCPA: Building computing platforms upon a solid foundation of trust. As businesses stake their very existence on the Internet, PCs, PDAs, and other key computing platforms, the trustworthiness of these platforms has become a vital concern. In response, the Trusted Computing Platform Alliance (TCPA) has delivered a complete specification for building trusted computing platforms atop trusted hardware. In Trusted Computing Platforms , leaders of the initiative illuminate TCPA for every systems developer and decision-maker. They place TCPA in context, outlining its goals, techniques, and powerful implications for the future. What trusted computing platforms are, how they work, and what problems they will solve Transforming standard platforms into trusted platforms cost-effectively Scenarios for managers: TCPA applications in the security-focused business Protected storage: how TCPA can ensure the confidentiality of stored data Software integrity: ensuring that a system's software environment hasn't been tampered with Trust mechanisms in a trusted platform: functional descriptions, advantages, and overhead Trusted platforms in practice: TCPA for developers and technical professionals How trusted platforms can be used to protect user privacy The TCPA initiative: its history, status, and next steps forward Backed by an extraordinary range of industry leaders, TCPA offers the first complete, cost-effective, and globally applicable solution for trusted computing. Whether you develop new systems or apply them in business or government, you need to understand this technology-and with this book, you will.
Subject Computer security -- Standards.
Electronic information resources -- Access control.
Computer networks -- Security measures.
Sécurité informatique -- Normes.
Sources d'information électroniques -- Accès -- Contrôle.
Réseaux d'ordinateurs -- Sécurité -- Mesures.
Computer networks -- Security measures
Computer security -- Standards
Electronic information resources -- Access control
Added Author Balacheff, Boris, author.
Balacheff, Boris.
Pearson, Siani.
Chen, Liqun, author.
Plaquin, David, author.
Proudler, Graeme, author.
O'Reilly for Higher Education (Firm), distributor.
Safari, an O'Reilly Media Company.
Other Form: Online version: Trusted computing platforms. Upper Saddle River, N.J. : Prentice Hall PTR, ©2003 (OCoLC)606255141
Online version: Trusted computing platforms. Upper Saddle River, N.J. : Prentice Hall PTR, ©2003 (OCoLC)606819924
ISBN 9780130092205
0130092207
Standard No. 0130092207
Patron reviews: add a review
Click for more information
EBOOK
No one has rated this material

You can...
Also...
- Find similar reads
- Add a review
- Sign-up for Newsletter
- Suggest a purchase
- Can't find what you want?
More Information