Intel® trusted execution technology for server platforms a guide to more secure datacenters

This book guides the server administrator / datacenter manager in enabling the technology as well as establishing a launch control policy that he can use to customize the server's boot process to fit the datacenter's requirements. This book explains how the OS (typically a Virtual Machine...

Full description

Bibliographic Details
Main Authors: Futral, William T., Greene, James (Author)
Format: eBook
Language:English
Published: Berkeley, CA, New York, New York ApressOpen, Distributed to the Book trade worldwide by Springer 2013
Series:The expert's voice in security
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 02676nmm a2200445 u 4500
001 EB001926661
003 EBX01000000000000001089563
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 1430261498 
020 |a 143026148X 
020 |a 9781430261490 
050 4 |a QA76.9.A25 
100 1 |a Futral, William T. 
245 0 0 |a Intel® trusted execution technology for server platforms  |b a guide to more secure datacenters  |c William Futral, James Greene 
260 |a Berkeley, CA, New York, New York  |b ApressOpen, Distributed to the Book trade worldwide by Springer  |c 2013 
300 |a xx, 133 pages 
505 0 |a Chapter 1. Introduction to trust and Intel trusted execution technology -- chapter 2. Fundamental principles of Intel TXT -- chapter 3. Getting it to work : provisioning Intel TXT -- chapter 4. Foundation for control : establishing launch control policy -- chapter 5. Raising visibility for trust : the role of attestation -- chapter 6. Trusted computing : opportunities in software -- chapter 7. Creating a more secure datacenter and cloud -- chapter 8. The future of trusted computing 
653 |a Data encryption (Computer science) / fast 
653 |a Chiffrement (Informatique) 
653 |a Bases de données / Sécurité / Mesures 
653 |a Database security / fast 
653 |a Computer science / bicssc 
653 |a Client/server computing / Security measures 
653 |a Database security / http://id.loc.gov/authorities/subjects/sh90005677 
653 |a Computer science 
653 |a Architecture client-serveur (Informatique) / Sécurité / Mesures 
653 |a Data encryption (Computer science) / http://id.loc.gov/authorities/subjects/sh94001524 
700 1 |a Greene, James  |e author 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
490 0 |a The expert's voice in security 
024 8 |a 10.1007/978-1-4302-6149-0 
776 |z 9781430261490 
776 |z 1430261498 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781430261483/?ar  |x Verlag  |3 Volltext 
082 0 |a 500 
082 0 |a 005.8 
520 |a This book guides the server administrator / datacenter manager in enabling the technology as well as establishing a launch control policy that he can use to customize the server's boot process to fit the datacenter's requirements. This book explains how the OS (typically a Virtual Machine Monitor or Hypervisor) and supporting software can build on the secure facilities afforded by Intel TXT to provide additional security features and functions. It provides examples how the datacenter can create and use trusted pools