買這商品的人也買了...
-
$1,710$1,620 -
$520$411 -
$700Professional Scrum Development with Microsoft Visual Studio 2012 (Paperback)
-
$490$387 -
$505深度探索嵌入式操作系統(從零開始設計架構和開發)
-
$680$537 -
$958深度學習
-
$650$507 -
$1,980$1,881 -
$500$395 -
$580$458 -
$594$564 -
$398$299 -
$460$414 -
$420$332 -
$719$683 -
$599$473 -
$800$624 -
$400$316 -
$780$616 -
$2,185$2,070 -
$713$677 -
$1,428$1,357 -
$454TPM 2.0 安全算法開發示例實戰
-
$600$474
相關主題
商品描述
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out.
Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM. The approach is to ramp the reader up quickly and keep their interest.A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security explains security concepts, describes the TPM 2.0 architecture, and provides code and pseudo-code examples in parallel, from very simple concepts and code to highly complex concepts and pseudo-code.
The book includes instructions for the available execution environments and real code examples to get readers up and talking to the TPM quickly. The authors then help the users expand on that with pseudo-code descriptions of useful applications using the TPM.
What you’ll learn
- TPM 2.0 architecture fundamentals, including changes from TPM 1.2
- TPM 2.0 security concepts
- Essential application development techniques
- A deep dive into the features of TPM 2.0
- A primer on the execution environments available for application development. Learn as you go!
Who this book is for
Application software developers, OS developers, device-driver developers, and embedded-device specialists, who will benefit from mastering TPM 2.0 capabilities and building their own applications quickly. This book will give them the tools they need to experiment with and understand the technology.
Software architects who need to understand the security guarantees provided by TPMs
Managers who fund the projects that use TPMs.
Non-technical users who may want to know why TPMs are on their computers and how to make use of them.
Table of Contents
Foreword
Preface
Chapter 1: Overview
Chapter 2: Security Concepts for Dummies
Chapter 3: Quick tutorial on TPM 2.0
Chapter 4: Existing Applications that make use of TPMs
Chapter 5: Navigating the spec
Chapter 6: Execution Environment
Chapter 7: TPM software stack (TSS)
Chapter 8: Intro to TPM Entities
Chapter 9: Hierarchies
Chapter 10: Keys
Chapter 11: NV Indices
Chapter 12: PCRs and Attestation
Chapter 13: Authorizations and Sessions
Chapter 14: EA (Policy Authorizations)
Chapter 15: Key management
Chapter 16: Audit
Chapter 17: Encrypt/Decrypt
Chapter 18: Object and Session Management
Chapter 19: TPM Startup and Provisioning
Chapter 20: How to debug TPM 2.0 applications
Chapter 21: Simple Applications
Chapter 22: Platform Security Technologies that Use TPM 2.0
商品描述(中文翻譯)
《TPM 2.0 實用指南:在新時代的安全中使用可信平台模組》是一本針對開發人員的基礎指南。它介紹了安全和 TPM 的概念,並展示了它們在真實應用中的使用,讀者可以嘗試實際操作。
簡單來說,這本書旨在激勵和激發編程社區去運用 TPM 做出酷炫的事情。作者的方法是快速提升讀者的能力並保持他們的興趣。《TPM 2.0 實用指南:在新時代的安全中使用可信平台模組》解釋了安全概念,描述了 TPM 2.0 的架構,並提供了代碼和偽代碼示例,從非常簡單的概念和代碼到高度複雜的概念和偽代碼。
本書包含了可用的執行環境的說明和真實代碼示例,以便讀者能夠快速上手並與 TPM 進行交互。然後,作者通過偽代碼描述有用的應用程序,幫助用戶擴展其能力。
本書的學習內容包括:
- TPM 2.0 架構基礎知識,包括與 TPM 1.2 的變化
- TPM 2.0 安全概念
- 必要的應用程序開發技術
- 深入研究 TPM 2.0 的功能
- 應用程序開發可用的執行環境入門
本書的目標讀者包括:
- 應用軟件開發人員、操作系統開發人員、設備驅動程序開發人員和嵌入式設備專家,他們將受益於掌握 TPM 2.0 的能力並快速構建自己的應用程序。本書將為他們提供實驗和理解技術所需的工具。
- 需要了解 TPM 提供的安全保證的軟件架構師。
- 資助使用 TPM 的項目的管理者。
- 非技術性用戶,可能想知道為什麼他們的計算機上有 TPM,以及如何使用它們。
本書的目錄包括:
- 前言
- 序言
- 第1章:概述
- 第2章:安全概念入門
- 第3章:TPM 2.0 快速教程
- 第4章:現有應用程序中使用 TPM 的案例
- 第5章:導覽規範
- 第6章:執行環境
- 第7章:TPM 軟件堆棧(TSS)
- 第8章:TPM 實體介紹
- 第9章:層次結構
- 第10章:密鑰
- 第11章:NV 索引
- 第12章:PCR 和驗證
- 第13章:授權和會話
- 第14章:EA(策略授權)
- 第15章:密鑰管理
- 第16章:審計
- 第17章:加密/解密
- 第18章:對象和會話管理
- 第19章:TPM 啟動和配置
- 第20章:如何調試 TPM 2.0 應用程序
- 第21章:簡單應用程序
- 第22章:使用 TPM 2.0 的平台安全技術