The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.
Bu e-kitabı satın alın ve 1 tane daha ÜCRETSİZ kazanın!
Biçim PDF ● Sayfalar 311 ● ISBN 9783110477597 ● Yayımcı De Gruyter ● Yayınlanan 2017 ● İndirilebilir 3 kez ● Döviz EUR ● Kimlik 6644805 ● Kopya koruma Adobe DRM
DRM özellikli bir e-kitap okuyucu gerektirir