買這商品的人也買了...
-
$3,360$3,192 -
$2,180$2,071 -
$700$665 -
$1,881Advanced Wireless Communications: 4G Cognitive and Cooperative Broadband Technologies, 2/e
-
$1,590$1,511 -
$5,040$4,788 -
$399Hacking Exposed Wireless
-
$700$686 -
$1,240Developing Practical Wireless Applications (Paperback)
-
$850Wireless Networking Technology: From Principles to Successful Implementation
-
$5,560$5,282 -
$690$545 -
$2,548Security for Wireless Ad Hoc Networks
-
$990$891 -
$1,200$1,140 -
$1,650$1,568 -
$1,180$1,003 -
$750$593 -
$620$490 -
$1,750$1,663 -
$890$703 -
$580$458 -
$1,820$1,729 -
$260$205 -
$650$514
相關主題
商品描述
Description
* Clear, practical tutorial style text with real-world applications * First book on TPM for embedded designers Aimed particularly at embedded designers and developers, this new book provides a sound foundation on the TPM, helping them to take advantage of hardware security based on sound TCG standards. It covers all the TPM basics, discussing in detail the TPM Key Hierarchy and the Trusted Platform Module specification. The book presents a methodology to enable designers and developers to successfully integrate the TPM into an embedded design and verify the TPM's operation on a specific platform. The companion CD-ROM contains the full source code, which can be customized and used in embedded designs?an extremely useful tool and timesaver for embedded developers!
Table of Contents
1. History of the Trusted Computing Group. 2. Cryptographic Basics. 3. Software vs. Hardware Based Security Models. 4. Hardware Design Considerations. 5. TPM Architectural Overview. 6. Root of Trust, the TPM Endorsement Key. 7. Key Hierarchy and Management. 8. Platform Configuration Registers. 9. TPM Command Message Overview. 10. TPM Intra Message Structures. 11. Anti-Replay Protection and Rolling Nonces. 12. Command Authorization. 13. Communicating with the TPM, Intel?s Low Pin Count (LPC) Bus. 14. TPM LPC Base Address Definitions and Functionality. 15. TPM Sacred Seven Command Suite. 16. Compliance Vectors and Their Purpose. 17. TPM System Deployment Initialization. 18. Establishing a TPM Owner and Owner Authorized Command Suite. 19. TPM Cryptographic Command Suite. 20. TPM PCR Command Suite. 21. TPM Protection Profile. 22. Trusted Device Driver. 23. Trusted Device Driver Layer and Interface. 24. Sequential Command Examples. 25. Migrating to the 1.2 Version of the TPM. 26. APPENDIX A- TPM Command List by Ordinal. 27. APPENDIX B- TPM Error List by Return Code. 28. APPENDIX C – SMBus, An Alternate Communication Model. 29. APPENDIX D – Compliance Test Suite Source Code, C Source.
商品描述(中文翻譯)
描述:
這本書是一本以清晰實用的教學風格撰寫的,並且具有真實世界應用的書籍。這是第一本針對嵌入式設計師的TPM(Trusted Platform Module)的書籍,旨在幫助他們利用基於可靠TCG(Trusted Computing Group)標準的硬體安全。書中涵蓋了所有TPM的基礎知識,詳細討論了TPM金鑰層次結構和可信平台模塊規範。本書提供了一種方法論,使設計師和開發人員能夠成功地將TPM集成到嵌入式設計中,並驗證TPM在特定平台上的運作。附帶的CD-ROM包含了完整的源代碼,可以根據需要進行定制和用於嵌入式設計,對於嵌入式開發人員來說是一個非常有用的工具和節省時間的方式。