𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Platform Embedded Security Technology Revealed

✍ Scribed by Xiaoyu Ruan (auth.)


Publisher
Apress
Year
2014
Tongue
English
Leaves
263
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Platform Embedded Security Technology Revealed is an in-depth introduction to Intel’s platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects applications’ secrets and users’ privacy in a secure, light-weight, and inexpensive way. Besides native built-in features, it allows third-party software vendors to develop applications that take advantage of the security infrastructures offered by the engine.

Intel’s security and management engine is technologically unique and significant, but is largely unknown to many members of the tech communities who could potentially benefit from it. Platform Embedded Security Technology Revealed reveals technical details of the engine. The engine provides a new way for the computer security industry to resolve critical problems resulting from booming mobile technologies, such as increasing threats against confidentiality and privacy. This book describes how this advanced level of protection is made possible by the engine, how it can improve users’ security experience, and how third-party vendors can make use of it.

It's written for computer security professionals and researchers; embedded system engineers; and software engineers and vendors who are interested in developing new security applications on top of Intel’s security and management engine.

It’s also written for advanced users who are interested in understanding how the security features of Intel’s platforms work.

✦ Table of Contents


Front Matter....Pages i-xxiv
Cyber Security in the Mobile Age....Pages 1-25
Intel’s Embedded Solutions: from Management to Security....Pages 27-55
Building Blocks of the Security and Management Engine....Pages 57-88
The Engine: Safeguarding Itself before Safeguarding Others....Pages 89-116
Privacy at the Next Level: Intel’s Enhanced Privacy Identification (EPID) Technology....Pages 117-141
Boot with Integrity, or Don’t Boot....Pages 143-163
Trust Computing, Backed by the Intel Platform Trust Technology....Pages 165-179
Unleashing Premium Entertainment with Hardware-Based Content Protection Technology....Pages 181-198
Breaking the Boundaries with Dynamically Loaded Applications....Pages 199-210
Intel Identity Protection Technology: the Robust, Convenient, and Cost-Effective Way to Deter Identity Theft....Pages 211-226
Looking Ahead: Tomorrow’s Innovations Built on Today’s Foundation....Pages 227-238
Back Matter....Pages 239-246

✦ Subjects


Data Encryption; Software Engineering/Programming and Operating Systems


πŸ“œ SIMILAR VOLUMES


Platform Embedded Security Technology Re
✍ Xiaoyu Ruan πŸ“‚ Library πŸ“… 2014 πŸ› Apress 🌐 English

Platform Embedded Security Technology Revealed is an in-depth introduction to Intel’s platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and

Platform Embedded Security Technology Re
✍ Xiaoyu Ruan πŸ“‚ Library πŸ“… 2014 πŸ› Apress 🌐 English

Platform Embedded Security Technology Revealed is an in-depth introduction to Intel's platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and

Secure Smart Embedded Devices, Platforms
✍ Keith Mayes, Konstantinos Markantonakis (auth.), Konstantinos Markantonakis, Kei πŸ“‚ Library πŸ“… 2014 πŸ› Springer-Verlag New York 🌐 English

<p><p>New generations of IT users are increasingly abstracted from the underlying devices and platforms that provide and safeguard their services. As a result they may have little awareness that they are critically dependent on the embedded security devices that are becoming pervasive in daily moder