The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.
Achetez cet ebook et obtenez-en 1 de plus GRATUITEMENT !
Format PDF ● Pages 311 ● ISBN 9783110477597 ● Maison d’édition De Gruyter ● Publié 2017 ● Téléchargeable 3 fois ● Devise EUR ● ID 6644805 ● Protection contre la copie Adobe DRM
Nécessite un lecteur de livre électronique compatible DRM