A practical guide to TPM 2.0 using the Trusted Platform Module in the new age of security

This book shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. It explains security concepts; describes the TPM 2.0 architecture and provides code and pseudo-code examples in parallel, from very simple concepts and code to highly complex concepts...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Arthur, Will (VerfasserIn), Challener, David (VerfasserIn), Goldman, Kenneth (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: [New York, NY] ApressOpen [2015]
Schriftenreihe:The expert's voice in secure computing
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000cam a22000002 4500
001 ZDB-30-ORH-047576901
003 DE-627-1
005 20240228115833.0
007 cr uuu---uuuuu
008 191023s2015 xx |||||o 00| ||eng c
020 |a 9781430265849  |9 978-1-4302-6584-9 
020 |a 1430265841  |9 1-4302-6584-1 
020 |a 1430265833  |9 1-4302-6583-3 
020 |a 9781430265832  |9 978-1-4302-6583-2 
035 |a (DE-627-1)047576901 
035 |a (DE-599)KEP047576901 
035 |a (ORHE)9781430265849 
035 |a (DE-627-1)047576901 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
072 7 |a URY.  |2 bicssc 
072 7 |a COM053000.  |2 bisacsh 
082 0 |a 005.8/2  |2 23 
100 1 |a Arthur, Will  |e VerfasserIn  |4 aut 
245 1 2 |a A practical guide to TPM 2.0  |b using the Trusted Platform Module in the new age of security  |c Will Arthur, David Challener, with Kenneth Goldman 
246 3 3 |a Using the Trusted Platform Module in the new age of security 
264 1 |a [New York, NY]  |b ApressOpen  |c [2015] 
264 4 |c ©2015 
300 |a 1 online resource (1 volume)  |b illustrations 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
490 0 |a The expert's voice in secure computing 
500 |a Includes index. - Place of publication taken from publisher's Web site. - Includes bibliographical references and index. - Online resource; title from title page (Safari, viewed April 15, 2015) 
520 |a This book shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. It explains security concepts; describes the TPM 2.0 architecture and provides code and pseudo-code examples in parallel, from very simple concepts and code to highly complex concepts and pseudo-code; and includes instructions for the available execution environments and real code examples to get readers up and talking to the TPM quickly. You will learn: TPM 2.0 architecture fundamentals, including changes from TPM 1.2; TPM 2.0 security concepts; essential application development techniques; features of TPM 2.0; execution environments available for application development. -- 
546 |a English. 
650 0 |a Computer security 
650 0 |a Data encryption (Computer science) 
650 0 |a Computer networks  |x Security measures 
650 4 |a Sécurité informatique 
650 4 |a Chiffrement (Informatique) 
650 4 |a Réseaux d'ordinateurs ; Sécurité ; Mesures 
650 4 |a Coding theory & cryptology 
650 4 |a Software Engineering 
650 4 |a Computer security 
650 4 |a Computers ; Security ; General 
650 4 |a Computers ; Software Development & Engineering ; General 
650 4 |a Computer networks ; Security measures 
650 4 |a Computer security 
650 4 |a Data encryption (Computer science) 
700 1 |a Challener, David  |e VerfasserIn  |4 aut 
700 1 |a Goldman, Kenneth  |e VerfasserIn  |4 aut 
776 1 |z 1430265833 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 1430265833 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/9781430265849/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
912 |a ZDB-30-ORH 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-047576901
_version_ 1818767313687543808
adam_text
any_adam_object
author Arthur, Will
Challener, David
Goldman, Kenneth
author_facet Arthur, Will
Challener, David
Goldman, Kenneth
author_role aut
aut
aut
author_sort Arthur, Will
author_variant w a wa
d c dc
k g kg
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)047576901
(DE-599)KEP047576901
(ORHE)9781430265849
dewey-full 005.8/2
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8/2
dewey-search 005.8/2
dewey-sort 15.8 12
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03253cam a22006612 4500</leader><controlfield tag="001">ZDB-30-ORH-047576901</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115833.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2015 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781430265849</subfield><subfield code="9">978-1-4302-6584-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1430265841</subfield><subfield code="9">1-4302-6584-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1430265833</subfield><subfield code="9">1-4302-6583-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781430265832</subfield><subfield code="9">978-1-4302-6583-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047576901</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047576901</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781430265849</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047576901</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">URY.</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM053000.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/2</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Arthur, Will</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="2"><subfield code="a">A practical guide to TPM 2.0</subfield><subfield code="b">using the Trusted Platform Module in the new age of security</subfield><subfield code="c">Will Arthur, David Challener, with Kenneth Goldman</subfield></datafield><datafield tag="246" ind1="3" ind2="3"><subfield code="a">Using the Trusted Platform Module in the new age of security</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[New York, NY]</subfield><subfield code="b">ApressOpen</subfield><subfield code="c">[2015]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">The expert's voice in secure computing</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - Place of publication taken from publisher's Web site. - Includes bibliographical references and index. - Online resource; title from title page (Safari, viewed April 15, 2015)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. It explains security concepts; describes the TPM 2.0 architecture and provides code and pseudo-code examples in parallel, from very simple concepts and code to highly complex concepts and pseudo-code; and includes instructions for the available execution environments and real code examples to get readers up and talking to the TPM quickly. You will learn: TPM 2.0 architecture fundamentals, including changes from TPM 1.2; TPM 2.0 security concepts; essential application development techniques; features of TPM 2.0; execution environments available for application development. --</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Chiffrement (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding theory &amp; cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers ; Software Development &amp; Engineering ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Challener, David</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Goldman, Kenneth</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">1430265833</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1430265833</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781430265849/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-047576901
illustrated Illustrated
indexdate 2024-12-18T08:47:54Z
institution BVB
isbn 9781430265849
1430265841
1430265833
9781430265832
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource (1 volume) illustrations
psigel ZDB-30-ORH
publishDate 2015
publishDateSearch 2015
publishDateSort 2015
publisher ApressOpen
record_format marc
series2 The expert's voice in secure computing
spelling Arthur, Will VerfasserIn aut
A practical guide to TPM 2.0 using the Trusted Platform Module in the new age of security Will Arthur, David Challener, with Kenneth Goldman
Using the Trusted Platform Module in the new age of security
[New York, NY] ApressOpen [2015]
©2015
1 online resource (1 volume) illustrations
Text txt rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
The expert's voice in secure computing
Includes index. - Place of publication taken from publisher's Web site. - Includes bibliographical references and index. - Online resource; title from title page (Safari, viewed April 15, 2015)
This book shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. It explains security concepts; describes the TPM 2.0 architecture and provides code and pseudo-code examples in parallel, from very simple concepts and code to highly complex concepts and pseudo-code; and includes instructions for the available execution environments and real code examples to get readers up and talking to the TPM quickly. You will learn: TPM 2.0 architecture fundamentals, including changes from TPM 1.2; TPM 2.0 security concepts; essential application development techniques; features of TPM 2.0; execution environments available for application development. --
English.
Computer security
Data encryption (Computer science)
Computer networks Security measures
Sécurité informatique
Chiffrement (Informatique)
Réseaux d'ordinateurs ; Sécurité ; Mesures
Coding theory & cryptology
Software Engineering
Computers ; Security ; General
Computers ; Software Development & Engineering ; General
Computer networks ; Security measures
Challener, David VerfasserIn aut
Goldman, Kenneth VerfasserIn aut
1430265833
Erscheint auch als Druck-Ausgabe 1430265833
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781430265849/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle Arthur, Will
Challener, David
Goldman, Kenneth
A practical guide to TPM 2.0 using the Trusted Platform Module in the new age of security
Computer security
Data encryption (Computer science)
Computer networks Security measures
Sécurité informatique
Chiffrement (Informatique)
Réseaux d'ordinateurs ; Sécurité ; Mesures
Coding theory & cryptology
Software Engineering
Computers ; Security ; General
Computers ; Software Development & Engineering ; General
Computer networks ; Security measures
title A practical guide to TPM 2.0 using the Trusted Platform Module in the new age of security
title_alt Using the Trusted Platform Module in the new age of security
title_auth A practical guide to TPM 2.0 using the Trusted Platform Module in the new age of security
title_exact_search A practical guide to TPM 2.0 using the Trusted Platform Module in the new age of security
title_full A practical guide to TPM 2.0 using the Trusted Platform Module in the new age of security Will Arthur, David Challener, with Kenneth Goldman
title_fullStr A practical guide to TPM 2.0 using the Trusted Platform Module in the new age of security Will Arthur, David Challener, with Kenneth Goldman
title_full_unstemmed A practical guide to TPM 2.0 using the Trusted Platform Module in the new age of security Will Arthur, David Challener, with Kenneth Goldman
title_short A practical guide to TPM 2.0
title_sort practical guide to tpm 2 0 using the trusted platform module in the new age of security
title_sub using the Trusted Platform Module in the new age of security
topic Computer security
Data encryption (Computer science)
Computer networks Security measures
Sécurité informatique
Chiffrement (Informatique)
Réseaux d'ordinateurs ; Sécurité ; Mesures
Coding theory & cryptology
Software Engineering
Computers ; Security ; General
Computers ; Software Development & Engineering ; General
Computer networks ; Security measures
topic_facet Computer security
Data encryption (Computer science)
Computer networks Security measures
Sécurité informatique
Chiffrement (Informatique)
Réseaux d'ordinateurs ; Sécurité ; Mesures
Coding theory & cryptology
Software Engineering
Computers ; Security ; General
Computers ; Software Development & Engineering ; General
Computer networks ; Security measures
url https://learning.oreilly.com/library/view/-/9781430265849/?ar
work_keys_str_mv AT arthurwill apracticalguidetotpm20usingthetrustedplatformmoduleinthenewageofsecurity
AT challenerdavid apracticalguidetotpm20usingthetrustedplatformmoduleinthenewageofsecurity
AT goldmankenneth apracticalguidetotpm20usingthetrustedplatformmoduleinthenewageofsecurity
AT arthurwill usingthetrustedplatformmoduleinthenewageofsecurity
AT challenerdavid usingthetrustedplatformmoduleinthenewageofsecurity
AT goldmankenneth usingthetrustedplatformmoduleinthenewageofsecurity
AT arthurwill practicalguidetotpm20usingthetrustedplatformmoduleinthenewageofsecurity
AT challenerdavid practicalguidetotpm20usingthetrustedplatformmoduleinthenewageofsecurity
AT goldmankenneth practicalguidetotpm20usingthetrustedplatformmoduleinthenewageofsecurity