Trusted Computing

Trusted Computing

De Gruyter | English | 2018 | ISBN-10: 3110476045 | 230 Pages | PDF | 3.68 mb
by Dengguo Feng (Author),? Tsinghua University Press (Contributor)

The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.


[Fast Download] Trusted Computing

Ebooks related to "Trusted Computing" :
Technical Safety - An Attribute of Quality: An Interdisciplinary Approach and Guideline
Advances in Safety Management and Human Factors: Proceedings of the AHFE 2017 International Conferen
Protecting Your Internet Identity
Strategic Cyber Defense: A Multidisciplinary Perspective
Cyber Security: A Practitioner's Guide
BlackBerry Hacks: Tips & Tools for Your Mobile Office
Have You Locked the Castle Gate?: Home and Small Business Computer Security
Effects Based Operations Applying Network Centric Warfare in Peace, Crisis, and War
Cryptography: An Introduction,3 Edition
Progress in Cryptology - INDOCRYPT 2010
Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.