The book summarizes key concepts and theories in trusted computing,
e.g., TPM, TCM, mobile modules, chain of trust, trusted software
stack etc, and discusses the configuration of trusted platforms and
network connections. It also emphasizes the application of such
technologies in practice, extending readers from computer science
and information science researchers to industrial engineers.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!