BN.com Gift Guide

Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Data Centers

Overview

"This book is a must have resource guide for anyone who wants to... implement TXT within their environments. I wish we had this guide when our engineering teams were implementing TXT on our solution platforms!”

John McAuley,EMC Corporation

"This book details innovative technology that provides significant benefit to both the cloud consumer and the cloud provider when working to meet the ever increasing requirements of trust and control in the cloud.”

Alex Rodriguez, Expedient ...

See more details below
Other sellers (Paperback)
  • All (13) from $9.42   
  • New (8) from $29.62   
  • Used (5) from $9.42   
Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK 7.0
  • Samsung Galaxy Tab 4 NOOK 10.1
  • NOOK HD Tablet
  • NOOK HD+ Tablet
  • NOOK eReaders
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
FREE

Overview

"This book is a must have resource guide for anyone who wants to... implement TXT within their environments. I wish we had this guide when our engineering teams were implementing TXT on our solution platforms!”

John McAuley,EMC Corporation

"This book details innovative technology that provides significant benefit to both the cloud consumer and the cloud provider when working to meet the ever increasing requirements of trust and control in the cloud.”

Alex Rodriguez, Expedient Data Centers

"This book is an invaluable reference for understanding enhanced server security, and how to deploy and leverage computing environment trust to reduce supply chain risk.”

Pete Nicoletti. VirtustreamInc.

Intel® Trusted Execution Technology (Intel TXT) is a new security technology that started appearing on Intel server platforms in 2010. This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations. This book guides the server administrator / datacenter manager in enabling the technology as well as establishing a launch control policy that he can use to customize the server’s boot process to fit the datacenter’s requirements. This book explains how the OS (typically a Virtual Machine Monitor or Hypervisor) and supporting software can build on the secure facilities afforded by Intel TXT to provide additional security features and functions. It provides examples how the datacenter can create and use trusted pools.

With a foreword from Albert Caballero, the CTO at Trapezoid.

What you’ll learn

  • It explains why TXT is important and the underlying principles (why it is effective).
  • How to enable and provision TXT
  • How to create a Launch Control Policy. It discusses trade-offs in determining the right policy for the datacenter, and walks the reader through the process for establishing the policy.
  • Demonstrates how to set up and use trusted pools and other advanced concepts such as geo-tagging.
  • Itwalks the reader through the process of making Intel TXT work for them and understand that TXT is a building block for current and future enhanced security concepts.


Who this book is for

The primary audience is the Datacenter Manager and members of an IT organization. It will be valuable to executives that need to understand enhanced server security and will provide a guide to OSVs and ISVs not only to understand the application of TXT but also the new opportunities that TXT enables and ways that the OS and applications can take advantage of those new capabilities. This book applies to cloud computing since TXT can be used to provide additional security for both public and private clouds.

Table of Contents

  1. Introduction
  2. Principals of TXT
  3. TXT Provisioning
  4. Launch Control Policy
  5. Opportunities for the OSV and ISVs
  6. Creating a More Secure Data Center
  7. Trusted Pools and Cloud Compliance Support
  8. Appendix


Read More Show Less

Product Details

  • ISBN-13: 9781430261483
  • Publisher: Apress
  • Publication date: 9/30/2013
  • Edition number: 1
  • Pages: 156
  • Product dimensions: 7.40 (w) x 9.00 (h) x 0.50 (d)

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)