Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out.Simply put, this book is designed to empower and excite...
Uložené v:
| Hlavní autori: | , |
|---|---|
| Médium: | E-kniha |
| Jazyk: | English |
| Vydavateľské údaje: |
New York
Apress
28.01.2015
ApressOpen, friendsof ED, Apress |
| Vydanie: | 2015. |
| Edícia: | The expert's voice in secure computing |
| Predmet: | |
| ISBN: | 9781430265832, 1430265833, 1430265841, 9781430265849 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out.Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM. The approach is to ramp the reader up quickly and keep their interest.A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security explains security concepts, describes the TPM 2.0 architecture, and provides code and pseudo-code examples in parallel, from very simple concepts and code to highly complex concepts and pseudo-code.The book includes instructions for the available execution environments and real code examples to get readers up and talking to the TPM quickly. The authors then help the users expand on that with pseudo-code descriptions of useful applications using the TPM. |
|---|---|
| AbstractList | A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM. The approach is to ramp the reader up quickly and keep their interest. A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security explains security concepts, describes the TPM 2.0 architecture, and provides code and pseudo-code examples in parallel, from very simple concepts and code to highly complex concepts and pseudo-code. The book includes instructions for the available execution environments and real code examples to get readers up and talking to the TPM quickly. The authors then help the users expand on that with pseudo-code descriptions of useful applications using the TPM. This book shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. It explains security concepts; describes the TPM 2.0 architecture and provides code and pseudo-code examples in parallel, from very simple concepts and code to highly complex concepts and pseudo-code; and includes instructions for the available execution environments and real code examples to get readers up and talking to the TPM quickly. You will learn: TPM 2.0 architecture fundamentals, including changes from TPM 1.2; TPM 2.0 security concepts; essential application development techniques; features of TPM 2.0; execution environments available for application development. -- |
| Author | Arthur, Will Challener, David |
| Author_xml | – sequence: 1 fullname: Arthur, Will – sequence: 2 fullname: Challener, David |
| BookMark | eNpN0F1LwzAUBuCICrq5_5ALEbyYJGmatN6NqVPYFzjFu5I2J1ttbKBJN_33Fqvg1eFwHl447wCd1K6GIzSgPCJMxAmnx2iUyuRvj9gZGnn_TgihnPFYiHP0tm5UEcpCWTxrSw04OLxZLzC7Ibf4xZf1Focd4E3T-gAar60KxjUfeOF0awGX9c95CQc82QJ2Bj9D0TZl-LpAp0ZZD6PfOUSvD_eb6eN4vpo9TSfzsWKEUzY2mkqQRhrBcsWJkDo1oHjChZEilyLNOaWFjqkmkYDYyEQqrkQiaZ6moEQ0RFd9sK9Ka70zIcudqzzjnzLLK999m1DKZAcve-j20Oim3EMPs9XdsmuEECGiJO3Ydc-Ur-Dgd84Gn-0t9PZfnTyNvgGIvWoQ |
| ContentType | eBook |
| DBID | AHRNR |
| DEWEY | 005.1 |
| DatabaseName | OverDrive Ebooks |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| DocumentTitleAlternate | Practical guide to Trusted Platform Module 2.0 |
| EISBN | 1430265841 9781430265849 |
| Edition | 2015. |
| Editor | Wiseman, Monty Osborn, Justin D |
| Editor_xml | – sequence: 1 fullname: Osborn, Justin D – sequence: 2 fullname: Wiseman, Monty |
| ExternalDocumentID | bks00081127 ODN0010066389 9781430265849 |
| Genre | Electronic books |
| GroupedDBID | 0DA 0DJ 38. A7I AABBV AAGZE AAHNQ AAKKN AALIM AALJR AAQKC AAZAK AAZUS ABEEZ ABFTD ABMNI ABRGO ADOGT AEHWL AEKFX AETDV AEZAY AGWHU AHRNR AIQUZ ALMA_UNASSIGNED_HOLDINGS ALNDD AZZ BBABE BIANM BKZYL I4C IEZ JJU OHILO OODEK PYIOH SAY SBO TKAFY TMQGW TPJZQ TWXRB V1H WZT Z7R Z7S Z7U Z7X Z7Y Z7Z Z81 Z83 Z84 Z85 Z88 6XM AAXZC BFMIH C6C DRU NUC Z87 |
| ID | FETCH-LOGICAL-a20412-fd17e7f7f62ba4067d9fea4846f76b769b411cd51d036e5f787a4a6871b99ea63 |
| ISBN | 9781430265832 1430265833 1430265841 9781430265849 |
| IngestDate | Fri Sep 23 12:24:34 EDT 2022 Fri Jul 04 04:31:51 EDT 2025 Sun Aug 17 06:49:54 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| LCCallNum | QA76.9.A25 A78 2015eb |
| LCCallNum_Ident | QA76.9.A25 A78 2015eb |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-a20412-fd17e7f7f62ba4067d9fea4846f76b769b411cd51d036e5f787a4a6871b99ea63 |
| Notes | Electronic reproduction. Dordrecht: Apress, 2015. Requires the Libby app or a modern web browser. |
| PageCount | 1 online resource |
| ParticipantIDs | skillsoft_books24x7_bks00081127 overdrive_books_ODN0010066389 askewsholts_vlebooks_9781430265849 |
| PublicationCentury | 2000 |
| PublicationDate | 2015-01-28 2015. [2015] ♭2015 |
| PublicationDateYYYYMMDD | 2015-01-28 2015-01-01 |
| PublicationDate_xml | – month: 01 year: 2015 text: 2015-01-28 day: 28 |
| PublicationDecade | 2010 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York |
| PublicationSeriesTitle | The expert's voice in secure computing |
| PublicationYear | 2015 |
| Publisher | Apress ApressOpen, friendsof ED, Apress |
| Publisher_xml | – name: Apress – name: ApressOpen, friendsof ED, Apress |
| SSID | ssj0001424566 |
| Score | 2.3642282 |
| Snippet | A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and... This book shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. It explains security concepts; describes... |
| SourceID | skillsoft overdrive askewsholts |
| SourceType | Aggregation Database |
| SubjectTerms | Computer networks Computer security Computer Technology Data encryption (Computer science) Nonfiction Security measures |
| SubjectTermsDisplay | Computer networks -- Security measures. Computer security. Computer Technology. Data encryption (Computer science) Electronic books. Nonfiction. Reference. |
| Title | Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security |
| URI | https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9781430265849&uid=none http://link.overdrive.com/?titleID=10066389&websiteID= http://www.books24x7.com/marc.asp?bookid=81127 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3Nb9MwFLfYQIJd-BaDDSLEDQUlqZNnHysGAgnKDtW0W-X4g02d0qlOq_75vOc6aboL4sAliuMoid8ven7--X0w9kEDZKJWOpUVmm9c2lFal0KmWoOGrHSCh3RNFz9gMhGXl_I8JvP3oZwANI3YbOTtf4UaryHYFDr7D3D3D8ULeI6g4xFhx-Mdi7hvRn_jLuQJpf57dW1CUYzp-c-Pxadsh2t7tQogEdEy2Nuniipb9AZe7pQ2_8ZEjjRG8MR9JBqK9eEvC0UC2kD8rxeod4hC8UTj2-Cwvmq72TGSC3l5h1wYB2dccm2h9zjKvGw8eTyeBc11O_AS2S5I0frCRV0pIme5n8m6nvtgguQFHLADqGitPIbvO0os7MJWIfwuPmY0aPC8S9HVvWO_TelQj5Sf4-SAE0frj9hD8oI1S5w28NzPUa748e3Afpg-YfctBZU8Zfds84w97kppJFGzPmcn46QHLwngJe0iQfASBO8Fu_j6Zfr5WxoLV6SqoPxlqTM5WHDgqqJWaDKBkc4qjraeg6qGStY8z7Upc4MGhC0dak3FVYWL11pKq6rRS3bYLBr7iiWFEZUGh6MsDBc6U5mxkiuOelhZ4PUxez8Y82x9EzbZ_WxPMMfstBfFbNv_62xCfABZnAL73_Xi2fYXfAOzAWCv_3rHG_Zo9wedsMN2ubKn7IFet9d--TYg_QepnzpC |
| linkProvider | Open Access Publishing in European Networks |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=A+practical+guide+to+TPM+2.0&rft.au=Arthur%2C+Will&rft.au=Challener%2C+David&rft.au=Goldman%2C+Kenneth+J&rft.series=The+expert%27s+voice+in+secure+computing&rft.date=2015-01-01&rft.pub=ApressOpen%2C+friendsof+ED%2C+Apress&rft.isbn=9781430265832&rft.externalDocID=bks00081127 |
| thumbnail_m | http://cvtisr.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97814302%2F9781430265849.jpg |

