Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography (硬體基礎的電腦安全技術:從生物識別到量子密碼學)
Roger R. Dube
買這商品的人也買了...
-
$480$379 -
$880$695 -
$850$672 -
$350$315 -
$650$585 -
$520$442 -
$880$695 -
$640$506 -
$450$405 -
$500$425 -
$540$459 -
$680$537 -
$580$493 -
$680$537 -
$890$703 -
$520$416 -
$480$408 -
$450$351 -
$550$550 -
$620$484 -
$580$458 -
$880$695 -
$400$316 -
$450$356 -
$380$300
相關主題
商品描述
Protecting valuable personal information against theft is a mission-critical component of today's electronic business community. In an effort to combat this serious and growing problem, the Intelligence and Defense communities have successfully employed the use of hardware-based security devices.
This book provides a road map of the hardware-based security devices that can defeat—and prevent—attacks by hackers. Beginning with an overview of the basic elements of computer security, the book covers:
-
Cryptography
-
Key generation and distribution
-
The qualities of security solutions
-
Secure co-processors
-
Secure bootstrap loading
-
Secure memory management and trusted execution technology
-
Trusted Platform Module (TPM)
-
Field Programmable Gate Arrays (FPGAs)
-
Hardware-based authentification
-
Biometrics
-
Tokens
-
Location technologies
Hardware-Based Computer Security Techniques to Defeat Hackers includes a chapter devoted entirely to showing readers how they can implement the strategies and technologies discussed. Finally, it concludes with two examples of security systems put into practice.
The information and critical analysis techniques provided in this user-friendly book are invaluable for a range of professionals, including IT personnel, computer engineers, computer security specialists, electrical engineers, software engineers, and industry analysts.
商品描述(中文翻譯)
本書以易讀的工具箱形式介紹了主要基於硬體的電腦安全方法。保護有價值的個人資訊免於被盜竊是當今電子商務社群中至關重要的組成部分。為了應對這個嚴重且不斷增長的問題,情報和國防社群成功地利用了基於硬體的安全設備。
本書提供了一個基於硬體的安全設備的路線圖,可以擊敗並防止駭客的攻擊。從電腦安全的基本要素概述開始,本書涵蓋了以下內容:
- 密碼學
- 金鑰生成和分配
- 安全解決方案的特性
- 安全協處理器
- 安全引導加載
- 安全內存管理和可信執行技術
- 可信平台模塊(TPM)
- 可編程閘陣列(FPGAs)
- 基於硬體的身份驗證
- 生物特徵識別
- 標記
- 定位技術
《基於硬體的電腦安全技術擊敗駭客》一書還包括一章完全專門介紹讀者如何實施所討論的策略和技術。最後,書中還提供了兩個實際應用安全系統的例子。
本書提供的信息和關鍵分析技術對於各種專業人士非常有價值,包括IT人員、電腦工程師、電腦安全專家、電氣工程師、軟體工程師和行業分析師。