A practical guide to TPM 2.0 using the Trusted Platform Module in the new age of security

This book shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. It explains security concepts; describes the TPM 2.0 architecture and provides code and pseudo-code examples in parallel, from very simple concepts and code to highly complex concepts...

Full description

Bibliographic Details
Main Authors: Arthur, Will, Challener, David (Author), Goldman, Kenneth (Author)
Format: eBook
Language:English
Published: [New York, NY], New York, NY ApressOpen, Distributed to the Book trade worldwide by Springer Science+Media New York 2015
Series:The expert's voice in secure computing
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 02936nmm a2200553 u 4500
001 EB001909349
003 EBX01000000000000001072251
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 1430265841 
020 |a 9781430265849 
020 |a 1430265833 
050 4 |a QA76.9.A25 
100 1 |a Arthur, Will 
245 0 0 |a A practical guide to TPM 2.0  |b using the Trusted Platform Module in the new age of security  |c Will Arthur, David Challener, with Kenneth Goldman 
246 3 1 |a Using the Trusted Platform Module in the new age of security 
260 |a [New York, NY], New York, NY  |b ApressOpen, Distributed to the Book trade worldwide by Springer Science+Media New York  |c 2015 
300 |a 1 volume  |b illustrations 
505 0 |a Includes bibliographical references and index 
653 |a Computer security 
653 |a Data encryption (Computer science) / fast 
653 |a Chiffrement (Informatique) 
653 |a Sécurité informatique 
653 |a Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277 
653 |a Computer networks / Security measures / fast 
653 |a Computers / Security / General / bisacsh 
653 |a Coding theory & cryptology / bicssc 
653 |a Computers / Software Development & Engineering / General / bisacsh 
653 |a Data encryption (Computer science) / http://id.loc.gov/authorities/subjects/sh94001524 
653 |a Réseaux d'ordinateurs / Sécurité / Mesures 
653 |a Computer security / bicssc 
653 |a Computer security / fast 
653 |a Software Engineering / bicssc 
700 1 |a Challener, David  |e author 
700 1 |a Goldman, Kenneth  |e author 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
490 0 |a The expert's voice in secure computing 
500 |a Includes index. - Place of publication taken from publisher's Web site 
015 |a GBB8M4277 
024 8 |a 10.1007/978-1-4302-6584-9 
776 |z 9781430265832 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781430265849/?ar  |x Verlag  |3 Volltext 
082 0 |a 331 
082 0 |a 500 
082 0 |a 005.8/2 
082 0 |a 620 
520 |a This book shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. It explains security concepts; describes the TPM 2.0 architecture and provides code and pseudo-code examples in parallel, from very simple concepts and code to highly complex concepts and pseudo-code; and includes instructions for the available execution environments and real code examples to get readers up and talking to the TPM quickly. You will learn: TPM 2.0 architecture fundamentals, including changes from TPM 1.2; TPM 2.0 security concepts; essential application development techniques; features of TPM 2.0; execution environments available for application development. --