0
نام کتاب
A Practical Guide to TPM 2.0

Using the Trusted Platform Module in the New Age of Security

Will Arthur, David Challener

Paperback375 Pages
PublisherApress
Edition1
LanguageEnglish
Year2015
ISBN9781430265832
959
A4361
انتخاب نوع چاپ:
جلد سخت
700,000ت
0
جلد نرم
620,000ت
0
طلق پاپکو و فنر
630,000ت
0
مجموع:
0تومان
کیفیت متن:اورجینال انتشارات
قطع:B5
رنگ صفحات:سیاه و سفید
پشتیبانی در روزهای تعطیل!
ارسال به سراسر کشور

#TPM2.0

#Security

#TPM

توضیحات

A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out.Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM. The approach is to ramp the reader up quickly and keep their interest.A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security explains security concepts, describes the TPM 2.0 architecture, and provides code and pseudo-code examples in parallel, from very simple concepts and code to highly complex concepts and pseudo-code.


The book includes instructions for the available execution environments and real code examples to get readers up and talking to the TPM quickly. The authors then help the users expand on that with pseudo-code descriptions of useful applications using the TPM.


Table of Contents

Chapter 1: History of the TPM

Chapter 2: Basic Security Concepts

Chapter 3: Quick Tutorial on TPM 2.0

Chapter 4: Existing Applications That Use TPMs

Chapter 5: Navigating the Specification

Chapter 6: Execution Environment

Chapter 7: TPM Software Stack

Chapter 8: TPM Entities

Chapter 9: Hierarchies

Chapter 10: Keys

Chapter 11: NV Indexes

Chapter 12: Platform Configuration Registers

Chapter 13: Authorizations and Sessions

Chapter 14: Extended Authorization (EA) Policies

Chapter 15: Key Management

Chapter 16: Auditing TPM Commands

Chapter 17: Decrypt/Encrypt Sessions

Chapter 19: Startup, Shutdown, and Provisioning

Chapter 20: Debugging

Chapter 21: Solving Bigger Problems with the TPM 2.0

Chapter 22: Platform Security Technologies That Use TPM 2.0


About the Author

Will Arthur is a server TXT architect and lead developer for Intel Corporation; currently developing TSS 2.0 system API specification and code; participant in TCG TPM 2.0 readability sub group, TPM workgroup, and TSS workgroup. He has a BS in Computer Science from Arizona State University and has worked in the embedded firmware, BIOS and low level software space for over 25 years.

دیدگاه خود را بنویسید
نظرات کاربران (0 دیدگاه)
نظری وجود ندارد.
کتاب های مشابه
هک و امنیت
1,624
Learning Malware Analysis
870,000 تومان
هک و امنیت
1,181
Practical Threat Intelligence and Data-Driven Threat Hunting
728,000 تومان
هک و امنیت
861
Understand the Cyber Attacker Mindset
536,000 تومان
هک و امنیت
1,160
Advanced API Security
734,000 تومان
هک و امنیت
1,152
Cybersecurity Risk Management
372,000 تومان
هک و امنیت
1,038
(ISC)2 CCSP Certified Cloud Security Professional Official Practice Te...
558,000 تومان
Agile & Scrum
2,157
Agile Security Operations
475,000 تومان
هک و امنیت
1,079
Practical Industrial Cybersecurity
1,217,000 تومان
هک و امنیت
1,230
A Hacker's Mind
578,000 تومان
هک و امنیت
2,066
Ghost in the Wires
710,000 تومان
قیمت
منصفانه
ارسال به
سراسر کشور
تضمین
کیفیت
پشتیبانی در
روزهای تعطیل
خرید امن
و آسان
آرشیو بزرگ
کتاب‌های تخصصی
هـر روز با بهتــرین و جــدیــدتـرین
کتاب های روز دنیا با ما همراه باشید
آدرس
پشتیبانی
مدیریت
ساعات پاسخگویی
درباره اسکای بوک
دسترسی های سریع
  • راهنمای خرید
  • راهنمای ارسال
  • سوالات متداول
  • قوانین و مقررات
  • وبلاگ
  • درباره ما
چاپ دیجیتال اسکای بوک. 2024-2022 ©