Limit search to available items
Book Cover
E-book
Author Arthur, Will, author

Title A practical guide to TPM 2.0 : using the Trusted Platform Module in the new age of security / Will Arthur, David Challener, with Kenneth Goldman
Published [New York, NY] : ApressOpen, [2015]
New York, NY : Distributed to the Book trade worldwide by Springer Science+Media New York
©2015
Online access available from:
SpringerOpen books    View Resource Record  

Copies

Description 1 online resource (1 volume) : illustrations
Series The expert's voice in secure computing
Expert's voice in secure computing.
Summary This book shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. It explains security concepts; describes the TPM 2.0 architecture and provides code and pseudo-code examples in parallel, from very simple concepts and code to highly complex concepts and pseudo-code; and includes instructions for the available execution environments and real code examples to get readers up and talking to the TPM quickly. You will learn: TPM 2.0 architecture fundamentals, including changes from TPM 1.2; TPM 2.0 security concepts; essential application development techniques; features of TPM 2.0; execution environments available for application development. -- Edited summary from book
Notes Includes index
Place of publication taken from publisher's Web site
Bibliography Includes bibliographical references and index
Notes English
Online resource; title from title page (Safari, viewed April 15, 2015)
Subject Computer security
Data encryption (Computer science)
Computer networks -- Security measures.
Coding theory & cryptology.
Software Engineering.
Computer security.
Computers -- Security -- General.
Computers -- Software Development & Engineering -- General.
Computer networks -- Security measures
Computer security
Data encryption (Computer science)
Form Electronic book
Author Challener, David, author.
Goldman, Kenneth, author
ISBN 9781430265849
1430265841
1430265833
9781430265832
Other Titles Using the Trusted Platform Module in the new age of security