Personnaliser

OK

Trusted Computing Platforms - Chen, Liqun

Note : 0

0 avis
  • Soyez le premier à donner un avis

Vous en avez un à vendre ?

Vendez-le-vôtre

83,63 €

Occasion · Très Bon État

  • Ou 20,91 € /mois

    • Livraison GRATUITE
    • Livré entre le 10 et le 13 avril
    Voir les modes de livraison

    momox

    PRO Vendeur favori

    4,8/5 sur + de 1 000 ventes

    Livré gratuitement chez vous en 2 semaines. Article presque inutilisé, absence presque totale de traces d'utilisation. 2 millions de ventes réalisées en 5 ans, merci de votre confiance ! Découvrez les avis (https://fr.shopping.rakuten.com/feedback/mo... Voir plus
    Publicité
     
    Vous avez choisi le retrait chez le vendeur à
    • Payez directement sur Rakuten (CB, PayPal, 4xCB...)
    • Récupérez le produit directement chez le vendeur
    • Rakuten vous rembourse en cas de problème

    Gratuit et sans engagement

    Félicitations !

    Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !

    En savoir plus

    Retour

    Horaires

        Note :


        Avis sur Trusted Computing Platforms Format Relié  - Livre Technologie

        Note : 0 0 avis sur Trusted Computing Platforms Format Relié  - Livre Technologie

        Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.


        Présentation Trusted Computing Platforms Format Relié

         - Livre Technologie

        Livre Technologie - Chen, Liqun - 01/01/2015 - Relié - Langue : Anglais

        . .

      • Auteur(s) : Chen, Liqun - Dalton, Chris - Proudler, Graeme
      • Editeur : Springer International Publishing Ag
      • Langue : Anglais
      • Parution : 01/01/2015
      • Format : Moyen, de 350g à 1kg
      • Nombre de pages : 400
      • Expédition : 764
      • Dimensions : 24.1 x 16.0 x 2.7
      • ISBN : 3319087436



      • Résumé :
        In this book the authors first describe the background of trusted platforms and trusted computing and speculate about the future. They then describe the technical features and architectures of trusted platforms from several different perspectives, finally explaining second-generation TPMs, including a technical description intended to supplement the Trusted Computing Group's TPM2 specifications. The intended audience is IT managers and engineers and graduate students in information security.

        Biographie:
        Graeme Proudler was a researcher at Hewlett-Packard Laboratories in Bristol, UK, and the Chair of the Trusted Computing Group?s Technical Committee until November 2013. He was the technical lead of the HP Labs research group that contributed to Trusted Computing Platform Alliance specifications, a founder member of the TCPA Technical Committee and original editor of the TCPA main (TPM) specification. His research interests include information security, networking and mobile communications.Dr. Liqun Chen is a researcher at Hewlett-Packard Laboratories in Bristol, UK. She has developed a number of well-known cryptographic schemes, some of which were designed for and are implemented in the TPM. She has an extensive publication record in cryptography and information security and holds 38 granted US patents in these areas. She has served as editor or co-editor for five ISO/IEC standard documents in cryptography and serves on boards for related academic journals and conferences.Christopher Dalton is a Principal Research Engineer within HP Labs, UK. His research interests include platform security (fixed and mobile), operating systems, network security and virtualisation, as well as a wider interest in distributed systems. He has been responsible for many successful technology transfers from research through to commercial products. He has published influential papers in the areas of systems, network security and virtualisation and has generated a number of patents in areas including novel low-level security features and efficient network virtualisation mechanisms.

        Sommaire:
        Introduction to Trusted Computing.- Futures for Trusted Computing.- Basics of Trusted Platforms.- Trusted Platform Architecture.- TPM2 Requirements.- TPM2 Operation.- Initialising TPM2.- Managing TPM2.- Accessing Keys and Data in TPM2.- Customer Configuration of TPM2 and Its Host Platform.- Starting to Use TPM2.- Direct Anonymous Attestation (DAA) in More Depth.- Machine Virtualisation, Virtual Machines, and TPMs.- Index.

        Détails de conformité du produit

        Consulter les détails de conformité de ce produit (

        Personne responsable dans l'UE

        )
        Le choixNeuf et occasion
        Minimum5% remboursés
        La sécuritéSatisfait ou remboursé
        Le service clientsÀ votre écoute
        LinkedinFacebookTwitterInstagramYoutubePinterestTiktok
        visavisa
        mastercardmastercard
        klarnaklarna
        paypalpaypal
        floafloa
        americanexpressamericanexpress
        Rakuten Logo
        • Rakuten Kobo
        • Rakuten TV
        • Rakuten Viber
        • Rakuten Viki
        • Plus de services
        • À propos de Rakuten
        Rakuten.com