Presents primary hardware-based computer security approaches in an
easy-to-read toolbox format
Protecting valuable personal information against theft is a
mission-critical component of today's electronic business
community. In an effort to combat this serious and growing problem,
the Intelligence and Defense communities have successfully employed
the use of hardware-based security devices.
This book provides a road map of the hardware-based security
devices that can defeat--and prevent--attacks by hackers. Beginning
with an overview of the basic elements of computer security, the
book covers:
Cryptography
Key generation and distribution
The qualities of security solutions
Secure co-processors
Secure bootstrap loading
Secure memory management and trusted execution technology
Trusted Platform Module (TPM)
Field Programmable Gate Arrays (FPGAs)
Hardware-based authentification
Biometrics
Tokens
Location technologies
Hardware-Based Computer Security Techniques to Defeat Hackers
includes a chapter devoted entirely to showing readers how they can
implement the strategies and technologies discussed. Finally, it
concludes with two examples of security systems put into
practice.
The information and critical analysis techniques provided in
this user-friendly book are invaluable for a range of
professionals, including IT personnel, computer engineers, computer
security specialists, electrical engineers, software engineers, and
industry analysts.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!