A practical guide to TPM 2.0 using the Trusted Platform Module in the new age of security
This book shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. It explains security concepts; describes the TPM 2.0 architecture and provides code and pseudo-code examples in parallel, from very simple concepts and code to highly complex concepts...
Main Authors: | , , |
---|---|
Format: | eBook |
Language: | English |
Published: |
[New York, NY], New York, NY
ApressOpen, Distributed to the Book trade worldwide by Springer Science+Media New York
2015
|
Series: | The expert's voice in secure computing
|
Subjects: | |
Online Access: | |
Collection: | O'Reilly - Collection details see MPG.ReNa |
Summary: | This book shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. It explains security concepts; describes the TPM 2.0 architecture and provides code and pseudo-code examples in parallel, from very simple concepts and code to highly complex concepts and pseudo-code; and includes instructions for the available execution environments and real code examples to get readers up and talking to the TPM quickly. You will learn: TPM 2.0 architecture fundamentals, including changes from TPM 1.2; TPM 2.0 security concepts; essential application development techniques; features of TPM 2.0; execution environments available for application development. -- |
---|---|
Item Description: | Includes index. - Place of publication taken from publisher's Web site |
Physical Description: | 1 volume illustrations |
ISBN: | 1430265841 9781430265849 1430265833 |