|
|
|
|
LEADER |
02936nmm a2200553 u 4500 |
001 |
EB001909349 |
003 |
EBX01000000000000001072251 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
210123 ||| eng |
020 |
|
|
|a 1430265841
|
020 |
|
|
|a 9781430265849
|
020 |
|
|
|a 1430265833
|
050 |
|
4 |
|a QA76.9.A25
|
100 |
1 |
|
|a Arthur, Will
|
245 |
0 |
0 |
|a A practical guide to TPM 2.0
|b using the Trusted Platform Module in the new age of security
|c Will Arthur, David Challener, with Kenneth Goldman
|
246 |
3 |
1 |
|a Using the Trusted Platform Module in the new age of security
|
260 |
|
|
|a [New York, NY], New York, NY
|b ApressOpen, Distributed to the Book trade worldwide by Springer Science+Media New York
|c 2015
|
300 |
|
|
|a 1 volume
|b illustrations
|
505 |
0 |
|
|a Includes bibliographical references and index
|
653 |
|
|
|a Computer security
|
653 |
|
|
|a Data encryption (Computer science) / fast
|
653 |
|
|
|a Chiffrement (Informatique)
|
653 |
|
|
|a Sécurité informatique
|
653 |
|
|
|a Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277
|
653 |
|
|
|a Computer networks / Security measures / fast
|
653 |
|
|
|a Computers / Security / General / bisacsh
|
653 |
|
|
|a Coding theory & cryptology / bicssc
|
653 |
|
|
|a Computers / Software Development & Engineering / General / bisacsh
|
653 |
|
|
|a Data encryption (Computer science) / http://id.loc.gov/authorities/subjects/sh94001524
|
653 |
|
|
|a Réseaux d'ordinateurs / Sécurité / Mesures
|
653 |
|
|
|a Computer security / bicssc
|
653 |
|
|
|a Computer security / fast
|
653 |
|
|
|a Software Engineering / bicssc
|
700 |
1 |
|
|a Challener, David
|e author
|
700 |
1 |
|
|a Goldman, Kenneth
|e author
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b OREILLY
|a O'Reilly
|
490 |
0 |
|
|a The expert's voice in secure computing
|
500 |
|
|
|a Includes index. - Place of publication taken from publisher's Web site
|
015 |
|
|
|a GBB8M4277
|
024 |
8 |
|
|a 10.1007/978-1-4302-6584-9
|
776 |
|
|
|z 9781430265832
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781430265849/?ar
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 331
|
082 |
0 |
|
|a 500
|
082 |
0 |
|
|a 005.8/2
|
082 |
0 |
|
|a 620
|
520 |
|
|
|a This book shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. It explains security concepts; describes the TPM 2.0 architecture and provides code and pseudo-code examples in parallel, from very simple concepts and code to highly complex concepts and pseudo-code; and includes instructions for the available execution environments and real code examples to get readers up and talking to the TPM quickly. You will learn: TPM 2.0 architecture fundamentals, including changes from TPM 1.2; TPM 2.0 security concepts; essential application development techniques; features of TPM 2.0; execution environments available for application development. --
|