Catálogo de publicaciones - libros
Título de Acceso Abierto
A Practical Guide to TPM 2.0: Using the New Trusted Platform Module in the New Age of Security
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
Computer science
Disponibilidad
Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
---|---|---|---|---|
No requiere | 2015 | Directory of Open access Books | ||
No requiere | 2015 | SpringerLink |
Información
Tipo de recurso:
libros
ISBN impreso
978-1-4302-6583-2
ISBN electrónico
978-1-4302-6584-9
Editor responsable
Springer Nature
País de edición
Reino Unido
Fecha de publicación
2015
Cobertura temática
Tabla de contenidos
Solving Bigger Problems with the TPM 2.0
Will Arthur; David Challener; Kenneth Goldman
Throughout this book, we have described examples of how you can use particular TPM commands in programs. This chapter looks at how some of those commands can be combined to create programs that use multiple features of the TPM. These ideas couldn’t be implemented easily with TPM 1.2, but TPM 2.0 has added features that make it easy to solve these problems.
Pp. 323-330
Platform Security Technologies That Use TPM 2.0
Will Arthur; David Challener; Kenneth Goldman
Okay, we’ve written a whole book on TPMs, and you’ve apparently read the whole thing. Perhaps our attempts to keep the book interesting were successful…or you’re extraordinarily persistent…or maybe you just cheated and skipped to the conclusion.
Pp. 331-348