Trusted Computing Platforms (Record no. 51471)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 02693nam a22005295i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-319-08744-3 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20200420220214.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 150108s2014 gw | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9783319087443 |
-- | 978-3-319-08744-3 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 005.8 |
100 1# - AUTHOR NAME | |
Author | Proudler, Graeme. |
245 10 - TITLE STATEMENT | |
Title | Trusted Computing Platforms |
Sub Title | TPM2.0 in Context / |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | XVIII, 382 p. 9 illus., 2 illus. in color. |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | Introduction to Trusted Computing -- Futures for Trusted Computing -- Basics of Trusted Platforms -- Trusted Platform Architecture -- TPM2 Requirements -- TPM2 Operation -- Initialising TPM2 -- Managing TPM2 -- Accessing Keys and Data in TPM2 -- Customer Configuration of TPM2 and Its Host Platform -- Starting to Use TPM2 -- Direct Anonymous Attestation (DAA) in More Depth -- Machine Virtualisation, Virtual Machines, and TPMs -- Index. |
520 ## - SUMMARY, ETC. | |
Summary, etc | In this book the authors first describe the background of trusted platforms and trusted computing, and speculate about the future. They then describe the technical features and architectures of trusted platforms from several different perspectives, finally explaining second-generation TPMs, including a technical description intended to supplement the Trusted Computing Group's TPM2 specifications. The intended audience is IT managers and engineers, and graduate students in information security. |
700 1# - AUTHOR 2 | |
Author 2 | Chen, Liqun. |
700 1# - AUTHOR 2 | |
Author 2 | Dalton, Chris. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | http://dx.doi.org/10.1007/978-3-319-08744-3 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Cham : |
-- | Springer International Publishing : |
-- | Imprint: Springer, |
-- | 2014. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer science. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer security. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data encryption (Computer science). |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | System safety. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Electrical engineering. |
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer Science. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Systems and Data Security. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data Encryption. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Communications Engineering, Networks. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Security Science and Technology. |
912 ## - | |
-- | ZDB-2-SCS |
No items available.