Trusted Computing : (Record no. 84576)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 04127nam a22008415i 4500 |
001 - CONTROL NUMBER | |
control field | 9783110477597 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240730161857.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 230228t20172018gw fo d z eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9783110477597 |
041 0# - LANGUAGE CODE | |
Language code of text/sound track or separate title | |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 005.8 |
100 1# - AUTHOR NAME | |
Author | Feng, Dengguo, |
245 10 - TITLE STATEMENT | |
Title | Trusted Computing : |
Sub Title | Principles and Applications / |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | 1 online resource (XI, 300 p.) |
490 0# - SERIES STATEMENT | |
Series statement | Advances in Computer Science , |
520 ## - SUMMARY, ETC. | |
Summary, etc | The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Management. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Security measures. |
700 1# - AUTHOR 2 | |
Author 2 | Tsinghua University Press, |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://doi.org/10.1515/9783110477597 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://www.degruyter.com/isbn/9783110477597 |
856 42 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://www.degruyter.com/document/cover/isbn/9783110477597/original |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Berlin ; |
-- | Boston : |
-- | De Gruyter, |
-- | [2017] |
264 #4 - | |
-- | ©2018 |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
588 0# - | |
-- | Description based on online resource; title from PDF title page (publisher's Web site, viewed 28. Feb 2023) |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Information technology |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Information technology |
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | COMPUTERS / Security / Networking. |
912 ## - | |
-- | 978-3-11-062526-4 EBOOK PACKAGE COMPLETE ENGLISH 2017 |
-- | 2017 |
912 ## - | |
-- | 978-3-11-071955-0 DG Plus eBook-Package 2018 |
-- | 2018 |
912 ## - | |
-- | 978-3-11-076248-8 DG Plus DeG Package 2018 Part 1 |
-- | 2018 |
912 ## - | |
-- | EBA_BACKALL |
912 ## - | |
-- | EBA_CL_CHCOMSGSEN |
912 ## - | |
-- | EBA_DGALL |
912 ## - | |
-- | EBA_EBACKALL |
912 ## - | |
-- | EBA_EBKALL |
912 ## - | |
-- | EBA_ECL_CHCOMSGSEN |
912 ## - | |
-- | EBA_EEBKALL |
912 ## - | |
-- | EBA_ESTMALL |
912 ## - | |
-- | EBA_STMALL |
912 ## - | |
-- | GBV-deGruyter-alles |
912 ## - | |
-- | PDA12STME |
912 ## - | |
-- | PDA13ENGE |
912 ## - | |
-- | PDA18STMEE |
912 ## - | |
-- | PDA5EBK |
912 ## - | |
-- | ZDB-23-DEI |
-- | 2017 |
912 ## - | |
-- | ZDB-23-DGG |
-- | 2017 |
No items available.