In this book the authors first describe the background of trusted platforms and trusted computing and speculate about the future. They then describe the technical features and architectures of trusted platforms from several different perspectives, finally explaining second-generation TPMs, including a technical description intended to supplement the Trusted Computing Group's TPM2 specifications. The intended audience is IT managers and engineers and graduate students in information security.
1133130256
Trusted Computing Platforms: TPM2.0 in Context
In this book the authors first describe the background of trusted platforms and trusted computing and speculate about the future. They then describe the technical features and architectures of trusted platforms from several different perspectives, finally explaining second-generation TPMs, including a technical description intended to supplement the Trusted Computing Group's TPM2 specifications. The intended audience is IT managers and engineers and graduate students in information security.
169.0
In Stock
5
1

Trusted Computing Platforms: TPM2.0 in Context
382
Trusted Computing Platforms: TPM2.0 in Context
382Related collections and offers
169.0
In Stock
Product Details
ISBN-13: | 9783319087443 |
---|---|
Publisher: | Springer-Verlag New York, LLC |
Publication date: | 01/08/2015 |
Sold by: | Barnes & Noble |
Format: | eBook |
Pages: | 382 |
File size: | 718 KB |
About the Author
From the B&N Reads Blog