買這商品的人也買了...
-
$990Trusted Computing Platforms: TCPA Technology in Context
-
$1,100$1,078 -
$880$695 -
$1,912Trusted Platform Module Basics: Using TPM in Embedded Systems
-
$550$435 -
$990$891 -
$880$695 -
$650$514 -
$580$458 -
$780$663 -
$880$695 -
$2,010$1,910 -
$690$621 -
$490$387 -
$650$514 -
$650$514 -
$750$593 -
$820$648 -
$980$774 -
$580$493 -
$480$374 -
$530$419 -
$650$514 -
$850$672 -
$580$452
相關主題
商品描述
Practical Guide to Trusted Computing
The TPM was developed by members of the Trusted Computing Group in order to establish an industry standard for a trusted computing subsystem to be added to PCs. The TPM is an open, freely downloadable specification that is now being embedded in hardware from major industry players including Dell, IBM and HP. This book is designed to provide developers with a practical understanding of how to use the Trusted Platform Module. (TPM) Through multiple examples, it provides the reader with an understanding of what problems the TPM can be used to solve, and the motivation behind the design decisions made in the specifications. After reading this book, the reader should better understand the security problems facing PC clients today and how to use the capabilities of a TPM, via the standard APIs to solve many of those problems. The TPM is a technology that assists with encryption at the hardware level instead of the software level. This makes it more difficult for hackers to break into the system. While major industry players are embedding the technology, it is still controversial particularly the features remote attestation, binding, and sealing which are viewed as potential threats to privacy and restrictiveness, in the same manner as Digital Rights Management.
商品描述(中文翻譯)
實用指南:可信計算
TPM(Trusted Platform Module)是由可信計算組織的成員開發的,旨在為個人電腦建立一個可信計算子系統的行業標準。TPM是一個開放且可免費下載的規範,現在已被戴爾、IBM和惠普等主要行業巨頭嵌入硬體中。本書旨在為開發人員提供實用的TPM使用理解。通過多個示例,讀者將了解TPM可以解決哪些問題,以及規範設計背後的動機。閱讀本書後,讀者應該更好地了解當今個人電腦客戶端面臨的安全問題,以及如何使用TPM的標準API來解決其中許多問題。TPM是一種在硬體層面上進行加密的技術,而不是在軟體層面上進行加密。這使得駭客更難入侵系統。儘管主要行業巨頭正在嵌入這項技術,但它仍然具有爭議性,特別是遠程驗證、綁定和封存等功能,這些功能被視為對隱私和限制性的潛在威脅,就像數字版權管理一樣。