By David Challener,Kent Yoder,Ryan Catherman,David Safford,Leendert Van Doorn

ISBN-10: 0132398427

ISBN-13: 9780132398428

Use relied on Computing to Make computers more secure, safer, and extra trustworthy

 

Every yr, computing device safeguard threats turn into extra serious. software program on my own can not accurately guard opposed to them: what’s wanted is safe undefined. The relied on Platform Module (TPM) makes that attainable via delivering an entire, open usual for enforcing relied on computing subsystems in desktops. Already on hand from nearly each major notebook producer, TPM supplies software program execs robust new how one can safeguard their consumers. Now, there’s a start-to-finish consultant for each software program expert and protection expert who desires to make the most of this leap forward protection expertise.

 

Authored by way of innovators who helped create TPM and enforce its modern items, this sensible e-book covers all points of TPM know-how: what it might probably in achieving, the way it works, and the way to put in writing purposes for it. The authors supply deep, real-world insights into either TPM and the depended on Computing workforce (TCG) software program Stack. Then, to illustrate how TPM can remedy a lot of today’s so much demanding safety difficulties, they current 4 start-to-finish case reports, each one with broad C-based code examples.

 

Coverage comprises

  • What providers and services are supplied through TPMs
  • TPM machine drivers: suggestions for code operating in BIOS, TSS stacks for brand new working platforms, and memory-constrained environments
  • Using TPM to augment the protection of a PC’s boot sequence
  • Key administration, intensive: key construction, garage, loading, migration, use, symmetric keys, and lots more and plenty extra
  • Linking PKCS#11 and TSS stacks to help functions with middleware services
  • What you want to find out about TPM and privacy--including find out how to keep away from privateness problems
  • Moving from TSS 1.1 to the recent TSS 1.2 standard
  • TPM and TSS command references and a whole functionality library

 

Show description

Read or Download A Practical Guide to Trusted Computing (IBM Press) PDF

Similar computer engineering books

Download e-book for iPad: Data Flow Analysis: Theory and Practice by Uday Khedker,Amitabha Sanyal,Bageshri Sathe

Information movement research is used to find details for a wide selection of invaluable functions, starting from compiler optimizations to software program engineering and verification. sleek compilers use it on produce performance-maximizing code, and software program engineers use it to re-engineer or opposite engineer courses and confirm the integrity in their courses.

Download e-book for iPad: Computational Methods in Cell Biology by Anand R. Asthagiri,Adam Arkin

Computational tools are enjoying an ever expanding function in telephone biology.  This quantity of tools in telephone Biology specializes in Computational tools in phone Biology and includes components: (1) information extraction and research to distill versions and mechanisms, and (2) constructing and simulating types to make predictions and testable hypotheses.

Download e-book for iPad: Low-Power Design of Nanometer FPGAs: Architecture and EDA by Hassan Hassan,Mohab Anis

Low-Power layout of Nanometer FPGAs structure and EDA is a useful reference for researchers and training engineers all in favour of power-efficient, FPGA layout. cutting-edge energy relief ideas for FPGAs can be defined and in comparison. those concepts may be utilized on the circuit, structure, and digital layout automation degrees to explain either the dynamic and leakage strength assets and let concepts for codesign.

Read e-book online Enterprise Interoperability: Interoperability for Agility, PDF

Agencies and businesses of any variety embedded in brand new financial surroundings are deeply depending on their skill to participate in collaborations. hence, it really is strongly required for them to get actively concerned for his or her personal profit in rising, possibly opportunistic collaborative firm networks.

Extra resources for A Practical Guide to Trusted Computing (IBM Press)

Sample text

Download PDF sample

A Practical Guide to Trusted Computing (IBM Press) by David Challener,Kent Yoder,Ryan Catherman,David Safford,Leendert Van Doorn


by Edward
4.4

Rated 4.18 of 5 – based on 41 votes