In this book the authors first describe the background of trusted
platforms and trusted computing and speculate about the future.
They then describe the technical features and architectures of
trusted platforms from several different perspectives, finally
explaining second-generation TPMs, including a technical
description intended to supplement the Trusted Computing Group's
TPM2 specifications. The intended audience is IT managers and
engineers and graduate students in information security.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!