Safeguarding the future of computing with Intel embedded security and management engine.</div>
Platform Embedded Security Technology Revealed: Safeguarding the Future of Computing with Intel Embedded Security and Management Engine
β Scribed by Xiaoyu Ruan
- Publisher
- Apress
- Year
- 2014
- Tongue
- English
- Leaves
- 263
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Platform Embedded Security Technology Revealed is an in-depth introduction to Intel's platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects applications' secrets and users' privacy in a secure, light-weight, and inexpensive way. Besides native built-in features, it allows third-party software vendors to develop applications that take advantage of the security infrastructures offered by the engine. Intel's security and management engine is technologically unique and significant, but is largely unknown to many members of the tech communities who could potentially benefit from it. Platform Embedded Security Technology Revealed reveals technical details of the engine.
π SIMILAR VOLUMES
Safeguarding the future of computing with Intel embedded security and management engine.</div>
Platform Embedded Security Technology Revealed is an in-depth introduction to Intelβs platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and
<p><p><em><strong>Platform Embedded Security Technology Revealed </strong></em>is an in-depth introduction to Intel’s platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The
<p><p>New generations of IT users are increasingly abstracted from the underlying devices and platforms that provide and safeguard their services. As a result they may have little awareness that they are critically dependent on the embedded security devices that are becoming pervasive in daily moder