I think this book may be useful for people more familiar with the subject.I hoped to understand TPM command to encrypt/decrypt the data/key but find the book hard to read. There are several examples in C but those are evasive and leave me with more questions and doubt. I gave up after several chapte
A Practical Guide to Trusted Computing
β Scribed by David Challener, Kent Yoder, Ryan Catherman, David Safford, Leendert Van Doorn
- Publisher
- IBM Press
- Year
- 2008
- Tongue
- English
- Leaves
- 376
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
π SIMILAR VOLUMES
<b>Use Trusted Computing to Make PCs Safer, More Secure, and More Reliable</b>Every year, computer security threats become more severe. Software alone can no longer adequately defend against them: what's needed is secure hardware. The Trusted Platform Module (TPM) makes that possible by providing a
Generally speaking, grid computing seeks to unify geographically dispersed computing systems to create one large, powerful system. Over the past 20 years, grid computing has had a relatively small impact on corporate productivity, due to the substantial investment it required to deploy and maintain
Criminals go where the money is. Today, trillions of dollars of assets are digital, and digital crime is growing fast. In response, demand for digital forensics experts is soaring. To succeed in this exciting field, you need strong technical and investigative skills. In this guide, one of the worldβ
<p><b>An insightful and practical guide to family trusts</b></p> <p><i>Family Trusts</i> is a step-by-step guide for anyone involved in family trusts: trust creators, trustees, beneficiaries, and advisors. It will help families create and administer a culture that recognizes trusts as a gift of love