نام کتاب
A Practical Guide to TPM 2.0

Using the Trusted Platform Module in the New Age of Security

Will Arthur, David Challener

Paperback375 Pages
PublisherApress
Edition1
LanguageEnglish
Year2015
ISBN9781430265832
907
A4361
انتخاب نوع چاپ:
جلد سخت
633,000ت
0
جلد نرم
573,000ت
0
طلق پاپکو و فنر
583,000ت
0
مجموع:
0تومان
کیفیت متن:اورجینال انتشارات
قطع:B5
رنگ صفحات:سیاه و سفید
پشتیبانی در روزهای تعطیل!
ارسال به سراسر کشور

#TPM2.0

#Security

#TPM

توضیحات

A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out.Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM. The approach is to ramp the reader up quickly and keep their interest.A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security explains security concepts, describes the TPM 2.0 architecture, and provides code and pseudo-code examples in parallel, from very simple concepts and code to highly complex concepts and pseudo-code.


The book includes instructions for the available execution environments and real code examples to get readers up and talking to the TPM quickly. The authors then help the users expand on that with pseudo-code descriptions of useful applications using the TPM.


Table of Contents

Chapter 1: History of the TPM

Chapter 2: Basic Security Concepts

Chapter 3: Quick Tutorial on TPM 2.0

Chapter 4: Existing Applications That Use TPMs

Chapter 5: Navigating the Specification

Chapter 6: Execution Environment

Chapter 7: TPM Software Stack

Chapter 8: TPM Entities

Chapter 9: Hierarchies

Chapter 10: Keys

Chapter 11: NV Indexes

Chapter 12: Platform Configuration Registers

Chapter 13: Authorizations and Sessions

Chapter 14: Extended Authorization (EA) Policies

Chapter 15: Key Management

Chapter 16: Auditing TPM Commands

Chapter 17: Decrypt/Encrypt Sessions

Chapter 19: Startup, Shutdown, and Provisioning

Chapter 20: Debugging

Chapter 21: Solving Bigger Problems with the TPM 2.0

Chapter 22: Platform Security Technologies That Use TPM 2.0


About the Author

Will Arthur is a server TXT architect and lead developer for Intel Corporation; currently developing TSS 2.0 system API specification and code; participant in TCG TPM 2.0 readability sub group, TPM workgroup, and TSS workgroup. He has a BS in Computer Science from Arizona State University and has worked in the embedded firmware, BIOS and low level software space for over 25 years.

دیدگاه خود را بنویسید
نظرات کاربران (0 دیدگاه)
نظری وجود ندارد.
کتاب های مشابه
+Security
1,122
CompTIA Security+
1,812,000 تومان
Network
1,904
Network Security
920,000 تومان
هک و امنیت
1,672
Mastering Service Mesh
987,000 تومان
هک و امنیت
965
Security for Web Developers
581,000 تومان
هک و امنیت
1,111
Malware Data Science
464,000 تومان
هک و امنیت
1,235
Practical Binary Analysis
666,000 تومان
وب
1,483
Grokking Web Application Security
530,000 تومان
هک و امنیت
506
Pentesting APIs
537,000 تومان
هک و امنیت
774
Cybersecurity Myths and Misconceptions
621,000 تومان
هک و امنیت
1,219
Blue Fox Arm Assembly Internals & Reverse Engineering
684,000 تومان
قیمت
منصفانه
ارسال به
سراسر کشور
تضمین
کیفیت
پشتیبانی در
روزهای تعطیل
خرید امن
و آسان
آرشیو بزرگ
کتاب‌های تخصصی
هـر روز با بهتــرین و جــدیــدتـرین
کتاب های روز دنیا با ما همراه باشید
آدرس
پشتیبانی
مدیریت
ساعات پاسخگویی
درباره اسکای بوک
دسترسی های سریع
  • راهنمای خرید
  • راهنمای ارسال
  • سوالات متداول
  • قوانین و مقررات
  • وبلاگ
  • درباره ما
چاپ دیجیتال اسکای بوک. 2024-2022 ©