Practical Guide to Trusted Computing (Paperback), Jan.2008.eBook-BBL

本书由TPM技术的创建者撰写,全面介绍了TPM技术及其应用。内容涵盖TPM提供的服务与能力、设备驱动解决方案、增强PC启动安全性、密钥管理、TPM与中间件服务集成、隐私问题及解决方案等,并提供了四个案例研究。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >

 TITLE : Practical Guide to Trusted Computing (Paperback) AUTHOR : by David Challener (Author), Kent Yoder (Author), Ryan Catherman (Author), David Safford (Author), Leendert Van Doorn (Author) PUBLISHER : IBM Press publisher ISBN : 0132398427 EDITION : 1st PUB DATE : January 06, 2008 LANGUAGE : English RLS DATE : 02/03/2008 MAKER : BBL SUPPLIER : BBL PACKAGER : BBL FORMAT : PDF SIZE : 01 x 1.44 MB [ R e l e a s e N o t e s ] Use Trusted Computing to Make PCs Safer, More Secure, and More Reliable Every year, computer security threats become more severe. Software alone can no longer adequately defend against them: what's needed is secure hardware. The Trusted Platform Module (TPM) makes that possible by providing a complete, open industry standard for implementing trusted computing hardware subsystems in PCs. Already available from virtually every leading PC manufacturer, TPM gives software professionals powerful new ways to protect their customers. Now, there's a start-to-finish guide for every software professional and security specialist who wants to utilize this breakthrough security technology. Authored by innovators who helped create TPM and implement its leading-edge products, this practical book covers all facets of TPM technology: what it can achieve, how it works, and how to write applications for it. The authors offer deep, real-world insights into both TPM and the Trusted Computing Group (TCG) Software Stack. Then, to demonstrate how TPM can solve many of today's most challenging security problems, they present four start-to-finish case studies, each with extensive C-based code examples. Coverage includes: - What services and capabilities are provided by TPMs - TPM device drivers: solutions for code running in BIOS, TSS stacks for new operating systems, and memory-constrained environments - Using TPM to enhance the security of a PC's boot sequence - Key management, in depth: key creation, storage, loading, migration, use, symmetric keys, and much more - Linking PKCS#11 and TSS stacks to support applications with middleware services - What you need to know about TPM and privacy--including how to avoid privacy problems - Moving from TSS 1.1 to the new TSS 1.2 standard - TPM and TSS command references and a complete function library URL: http://www.amazon.com/exec/obidos/tg/detail/-/0132398427/ Download: http://depositfiles.com/files/3368971 Mirror Download: http://rapidshare.com/files/88893030/0132398427.zip
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值