The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.
Cuprins
Table of Content:
Chapter 1 Introduction
1.1 Latest development
1.2 Overview on credible terminal configuration, remote attestation, trusted network connect
1.3 Challeng...
Despre autor
Dengguo Feng, Institute of Software, Chinese Academy of Sciences, Beijing, China
Cumpărați această carte electronică și primiți încă 1 GRATUIT!
Limba Engleză ● Format EPUB ● Pagini 311 ● ISBN 9783110476095 ● Mărime fișier 15.6 MB ● Editura De Gruyter ● Oraș Berlin/Boston ● Publicat 2017 ● Ediție 1 ● Descărcabil 24 luni ● Valută EUR ● ID 6644799 ● Protecție împotriva copiilor Adobe DRM
Necesită un cititor de ebook capabil de DRM