0
Your cart
![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
Showing 1 - 1 of 1 matches in All Departments
In this book the authors first describe the background of trusted platforms and trusted computing and speculate about the future. They then describe the technical features and architectures of trusted platforms from several different perspectives, finally explaining second-generation TPMs, including a technical description intended to supplement the Trusted Computing Group's TPM2 specifications. The intended audience is IT managers and engineers and graduate students in information security.
|
You may like...
1 Recce: Volume 3 - Onsigbaarheid Is Ons…
Alexander Strachan
Paperback
Trinity - The Best-Kept Secret
Jacques Vallee, Paola Leopizzi Harris
Hardcover
R1,105
Discovery Miles 11 050
White Fragility - Why It's So Hard For…
Robin DiAngelo
Paperback
(1)
|