|
|
|
|
LEADER |
02676nmm a2200445 u 4500 |
001 |
EB001926661 |
003 |
EBX01000000000000001089563 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
210123 ||| eng |
020 |
|
|
|a 1430261498
|
020 |
|
|
|a 143026148X
|
020 |
|
|
|a 9781430261490
|
050 |
|
4 |
|a QA76.9.A25
|
100 |
1 |
|
|a Futral, William T.
|
245 |
0 |
0 |
|a Intel® trusted execution technology for server platforms
|b a guide to more secure datacenters
|c William Futral, James Greene
|
260 |
|
|
|a Berkeley, CA, New York, New York
|b ApressOpen, Distributed to the Book trade worldwide by Springer
|c 2013
|
300 |
|
|
|a xx, 133 pages
|
505 |
0 |
|
|a Chapter 1. Introduction to trust and Intel trusted execution technology -- chapter 2. Fundamental principles of Intel TXT -- chapter 3. Getting it to work : provisioning Intel TXT -- chapter 4. Foundation for control : establishing launch control policy -- chapter 5. Raising visibility for trust : the role of attestation -- chapter 6. Trusted computing : opportunities in software -- chapter 7. Creating a more secure datacenter and cloud -- chapter 8. The future of trusted computing
|
653 |
|
|
|a Data encryption (Computer science) / fast
|
653 |
|
|
|a Chiffrement (Informatique)
|
653 |
|
|
|a Bases de données / Sécurité / Mesures
|
653 |
|
|
|a Database security / fast
|
653 |
|
|
|a Computer science / bicssc
|
653 |
|
|
|a Client/server computing / Security measures
|
653 |
|
|
|a Database security / http://id.loc.gov/authorities/subjects/sh90005677
|
653 |
|
|
|a Computer science
|
653 |
|
|
|a Architecture client-serveur (Informatique) / Sécurité / Mesures
|
653 |
|
|
|a Data encryption (Computer science) / http://id.loc.gov/authorities/subjects/sh94001524
|
700 |
1 |
|
|a Greene, James
|e author
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b OREILLY
|a O'Reilly
|
490 |
0 |
|
|a The expert's voice in security
|
024 |
8 |
|
|a 10.1007/978-1-4302-6149-0
|
776 |
|
|
|z 9781430261490
|
776 |
|
|
|z 1430261498
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781430261483/?ar
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 500
|
082 |
0 |
|
|a 005.8
|
520 |
|
|
|a This book guides the server administrator / datacenter manager in enabling the technology as well as establishing a launch control policy that he can use to customize the server's boot process to fit the datacenter's requirements. This book explains how the OS (typically a Virtual Machine Monitor or Hypervisor) and supporting software can build on the secure facilities afforded by Intel TXT to provide additional security features and functions. It provides examples how the datacenter can create and use trusted pools
|