Catálogo de publicaciones - libros

Compartir en
redes sociales


Título de Acceso Abierto

A Practical Guide to TPM 2.0: Using the New Trusted Platform Module in the New Age of Security

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

Computer science

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No requiere 2015 Directory of Open access Books acceso abierto
No requiere 2015 SpringerLink acceso abierto

Información

Tipo de recurso:

libros

ISBN impreso

978-1-4302-6583-2

ISBN electrónico

978-1-4302-6584-9

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Tabla de contenidos

Solving Bigger Problems with the TPM 2.0

Will Arthur; David Challener; Kenneth Goldman

Throughout this book, we have described examples of how you can use particular TPM commands in programs. This chapter looks at how some of those commands can be combined to create programs that use multiple features of the TPM. These ideas couldn’t be implemented easily with TPM 1.2, but TPM 2.0 has added features that make it easy to solve these problems.

Pp. 323-330

Platform Security Technologies That Use TPM 2.0

Will Arthur; David Challener; Kenneth Goldman

Okay, we’ve written a whole book on TPMs, and you’ve apparently read the whole thing. Perhaps our attempts to keep the book interesting were successful…or you’re extraordinarily persistent…or maybe you just cheated and skipped to the conclusion.

Pp. 331-348