The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.
购买此电子书可免费获赠一本!
格式 PDF ● 网页 311 ● ISBN 9783110477597 ● 出版者 De Gruyter ● 发布时间 2017 ● 下载 3 时 ● 货币 EUR ● ID 6644805 ● 复制保护 Adobe DRM
需要具备DRM功能的电子书阅读器