Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security

A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out.Simply put, this book is designed to empower and excite...

Celý popis

Uložené v:
Podrobná bibliografia
Hlavní autori: Arthur, Will, Challener, David
Médium: E-kniha
Jazyk:English
Vydavateľské údaje: New York Apress 28.01.2015
ApressOpen, friendsof ED, Apress
Vydanie:2015.
Edícia:The expert's voice in secure computing
Predmet:
ISBN:9781430265832, 1430265833, 1430265841, 9781430265849
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out.Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM. The approach is to ramp the reader up quickly and keep their interest.A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security explains security concepts, describes the TPM 2.0 architecture, and provides code and pseudo-code examples in parallel, from very simple concepts and code to highly complex concepts and pseudo-code.The book includes instructions for the available execution environments and real code examples to get readers up and talking to the TPM quickly. The authors then help the users expand on that with pseudo-code descriptions of useful applications using the TPM.
AbstractList A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM. The approach is to ramp the reader up quickly and keep their interest. A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security explains security concepts, describes the TPM 2.0 architecture, and provides code and pseudo-code examples in parallel, from very simple concepts and code to highly complex concepts and pseudo-code. The book includes instructions for the available execution environments and real code examples to get readers up and talking to the TPM quickly. The authors then help the users expand on that with pseudo-code descriptions of useful applications using the TPM.
This book shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. It explains security concepts; describes the TPM 2.0 architecture and provides code and pseudo-code examples in parallel, from very simple concepts and code to highly complex concepts and pseudo-code; and includes instructions for the available execution environments and real code examples to get readers up and talking to the TPM quickly. You will learn: TPM 2.0 architecture fundamentals, including changes from TPM 1.2; TPM 2.0 security concepts; essential application development techniques; features of TPM 2.0; execution environments available for application development. --
Author Arthur, Will
Challener, David
Author_xml – sequence: 1
  fullname: Arthur, Will
– sequence: 2
  fullname: Challener, David
BookMark eNpN0F1LwzAUBuCICrq5_5ALEbyYJGmatN6NqVPYFzjFu5I2J1ttbKBJN_33Fqvg1eFwHl447wCd1K6GIzSgPCJMxAmnx2iUyuRvj9gZGnn_TgihnPFYiHP0tm5UEcpCWTxrSw04OLxZLzC7Ibf4xZf1Focd4E3T-gAar60KxjUfeOF0awGX9c95CQc82QJ2Bj9D0TZl-LpAp0ZZD6PfOUSvD_eb6eN4vpo9TSfzsWKEUzY2mkqQRhrBcsWJkDo1oHjChZEilyLNOaWFjqkmkYDYyEQqrkQiaZ6moEQ0RFd9sK9Ka70zIcudqzzjnzLLK999m1DKZAcve-j20Oim3EMPs9XdsmuEECGiJO3Ydc-Ur-Dgd84Gn-0t9PZfnTyNvgGIvWoQ
ContentType eBook
DBID AHRNR
DEWEY 005.1
DatabaseName OverDrive Ebooks
DatabaseTitleList


DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
DocumentTitleAlternate Practical guide to Trusted Platform Module 2.0
EISBN 1430265841
9781430265849
Edition 2015.
Editor Wiseman, Monty
Osborn, Justin D
Editor_xml – sequence: 1
  fullname: Osborn, Justin D
– sequence: 2
  fullname: Wiseman, Monty
ExternalDocumentID bks00081127
ODN0010066389
9781430265849
Genre Electronic books
GroupedDBID 0DA
0DJ
38.
A7I
AABBV
AAGZE
AAHNQ
AAKKN
AALIM
AALJR
AAQKC
AAZAK
AAZUS
ABEEZ
ABFTD
ABMNI
ABRGO
ADOGT
AEHWL
AEKFX
AETDV
AEZAY
AGWHU
AHRNR
AIQUZ
ALMA_UNASSIGNED_HOLDINGS
ALNDD
AZZ
BBABE
BIANM
BKZYL
I4C
IEZ
JJU
OHILO
OODEK
PYIOH
SAY
SBO
TKAFY
TMQGW
TPJZQ
TWXRB
V1H
WZT
Z7R
Z7S
Z7U
Z7X
Z7Y
Z7Z
Z81
Z83
Z84
Z85
Z88
6XM
AAXZC
BFMIH
C6C
DRU
NUC
Z87
ID FETCH-LOGICAL-a20412-fd17e7f7f62ba4067d9fea4846f76b769b411cd51d036e5f787a4a6871b99ea63
ISBN 9781430265832
1430265833
1430265841
9781430265849
IngestDate Fri Sep 23 12:24:34 EDT 2022
Fri Jul 04 04:31:51 EDT 2025
Sun Aug 17 06:49:54 EDT 2025
IsPeerReviewed false
IsScholarly false
LCCallNum QA76.9.A25 A78 2015eb
LCCallNum_Ident QA76.9.A25 A78 2015eb
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-a20412-fd17e7f7f62ba4067d9fea4846f76b769b411cd51d036e5f787a4a6871b99ea63
Notes Electronic reproduction. Dordrecht: Apress, 2015. Requires the Libby app or a modern web browser.
PageCount 1 online resource
ParticipantIDs skillsoft_books24x7_bks00081127
overdrive_books_ODN0010066389
askewsholts_vlebooks_9781430265849
PublicationCentury 2000
PublicationDate 2015-01-28
2015.
[2015]
♭2015
PublicationDateYYYYMMDD 2015-01-28
2015-01-01
PublicationDate_xml – month: 01
  year: 2015
  text: 2015-01-28
  day: 28
PublicationDecade 2010
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationSeriesTitle The expert's voice in secure computing
PublicationYear 2015
Publisher Apress
ApressOpen, friendsof ED, Apress
Publisher_xml – name: Apress
– name: ApressOpen, friendsof ED, Apress
SSID ssj0001424566
Score 2.3642282
Snippet A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and...
This book shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. It explains security concepts; describes...
SourceID skillsoft
overdrive
askewsholts
SourceType Aggregation Database
SubjectTerms Computer networks
Computer security
Computer Technology
Data encryption (Computer science)
Nonfiction
Security measures
SubjectTermsDisplay Computer networks -- Security measures.
Computer security.
Computer Technology.
Data encryption (Computer science)
Electronic books.
Nonfiction.
Reference.
Title Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security
URI https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9781430265849&uid=none
http://link.overdrive.com/?titleID=10066389&websiteID=
http://www.books24x7.com/marc.asp?bookid=81127
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3Nb9MwFLfYQIJd-BaDDSLEDQUlqZNnHysGAgnKDtW0W-X4g02d0qlOq_75vOc6aboL4sAliuMoid8ven7--X0w9kEDZKJWOpUVmm9c2lFal0KmWoOGrHSCh3RNFz9gMhGXl_I8JvP3oZwANI3YbOTtf4UaryHYFDr7D3D3D8ULeI6g4xFhx-Mdi7hvRn_jLuQJpf57dW1CUYzp-c-Pxadsh2t7tQogEdEy2Nuniipb9AZe7pQ2_8ZEjjRG8MR9JBqK9eEvC0UC2kD8rxeod4hC8UTj2-Cwvmq72TGSC3l5h1wYB2dccm2h9zjKvGw8eTyeBc11O_AS2S5I0frCRV0pIme5n8m6nvtgguQFHLADqGitPIbvO0os7MJWIfwuPmY0aPC8S9HVvWO_TelQj5Sf4-SAE0frj9hD8oI1S5w28NzPUa748e3Afpg-YfctBZU8Zfds84w97kppJFGzPmcn46QHLwngJe0iQfASBO8Fu_j6Zfr5WxoLV6SqoPxlqTM5WHDgqqJWaDKBkc4qjraeg6qGStY8z7Upc4MGhC0dak3FVYWL11pKq6rRS3bYLBr7iiWFEZUGh6MsDBc6U5mxkiuOelhZ4PUxez8Y82x9EzbZ_WxPMMfstBfFbNv_62xCfABZnAL73_Xi2fYXfAOzAWCv_3rHG_Zo9wedsMN2ubKn7IFet9d--TYg_QepnzpC
linkProvider Open Access Publishing in European Networks
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=A+practical+guide+to+TPM+2.0&rft.au=Arthur%2C+Will&rft.au=Challener%2C+David&rft.au=Goldman%2C+Kenneth+J&rft.series=The+expert%27s+voice+in+secure+computing&rft.date=2015-01-01&rft.pub=ApressOpen%2C+friendsof+ED%2C+Apress&rft.isbn=9781430265832&rft.externalDocID=bks00081127
thumbnail_m http://cvtisr.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97814302%2F9781430265849.jpg