Book
Licensed
Unlicensed
Requires Authentication
Trusted Computing
Principles and Applications
-
Dengguo Feng
-
Together with:
Tsinghua University Press
Language:
English
Published/Copyright:
2018
About this book
The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.
- Presents trusted computing theories and technologies.
- Evaluates and analyzes trusted computing platforms.
- Incorporates project experiences and industrial applications.
Author / Editor information
Dengguo Feng, Institute of Software, Chinese Academy of Sciences, Beijing, China
Topics
Publicly Available Download PDF |
I |
Requires Authentication Unlicensed Licensed Download PDF |
V |
Publicly Available Download PDF |
VII |
Requires Authentication Unlicensed Licensed Download PDF |
1 |
Requires Authentication Unlicensed Licensed Download PDF |
18 |
Requires Authentication Unlicensed Licensed Download PDF |
66 |
Requires Authentication Unlicensed Licensed Download PDF |
100 |
Requires Authentication Unlicensed Licensed Download PDF |
133 |
Requires Authentication Unlicensed Licensed Download PDF |
168 |
Requires Authentication Unlicensed Licensed Download PDF |
197 |
Requires Authentication Unlicensed Licensed Download PDF |
243 |
Requires Authentication Unlicensed Licensed Download PDF |
265 |
Requires Authentication Unlicensed Licensed Download PDF |
289 |
Requires Authentication Unlicensed Licensed Download PDF |
299 |
Publishing information
Pages and Images/Illustrations in book
eBook published on:
December 18, 2017
eBook ISBN:
9783110477597
Hardcover published on:
December 18, 2017
Hardcover ISBN:
9783110476040
Pages and Images/Illustrations in book
Front matter:
11
Main content:
300
Illustrations:
50
Tables:
10
Audience(s) for this book
Computer Scientists, Information Scientists, Cryptologists, System Engineers, Network Managers.
Safety & product resources
-
Manufacturer information:
Walter de Gruyter GmbH
Genthiner Straße 13
10785 Berlin
productsafety@degruyterbrill.com