A practical guide to TPM 2.0 using the Trusted Platform Module in the new age of security
This book shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. It explains security concepts; describes the TPM 2.0 architecture and provides code and pseudo-code examples in parallel, from very simple concepts and code to highly complex concepts...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
[New York, NY]
ApressOpen
[2015]
|
Schriftenreihe: | The expert's voice in secure computing
|
Schlagworte: | |
Online-Zugang: | lizenzpflichtig |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047576901 | ||
003 | DE-627-1 | ||
005 | 20240228115833.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2015 xx |||||o 00| ||eng c | ||
020 | |a 9781430265849 |9 978-1-4302-6584-9 | ||
020 | |a 1430265841 |9 1-4302-6584-1 | ||
020 | |a 1430265833 |9 1-4302-6583-3 | ||
020 | |a 9781430265832 |9 978-1-4302-6583-2 | ||
035 | |a (DE-627-1)047576901 | ||
035 | |a (DE-599)KEP047576901 | ||
035 | |a (ORHE)9781430265849 | ||
035 | |a (DE-627-1)047576901 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a URY. |2 bicssc | |
072 | 7 | |a COM053000. |2 bisacsh | |
082 | 0 | |a 005.8/2 |2 23 | |
100 | 1 | |a Arthur, Will |e VerfasserIn |4 aut | |
245 | 1 | 2 | |a A practical guide to TPM 2.0 |b using the Trusted Platform Module in the new age of security |c Will Arthur, David Challener, with Kenneth Goldman |
246 | 3 | 3 | |a Using the Trusted Platform Module in the new age of security |
264 | 1 | |a [New York, NY] |b ApressOpen |c [2015] | |
264 | 4 | |c ©2015 | |
300 | |a 1 online resource (1 volume) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a The expert's voice in secure computing | |
500 | |a Includes index. - Place of publication taken from publisher's Web site. - Includes bibliographical references and index. - Online resource; title from title page (Safari, viewed April 15, 2015) | ||
520 | |a This book shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. It explains security concepts; describes the TPM 2.0 architecture and provides code and pseudo-code examples in parallel, from very simple concepts and code to highly complex concepts and pseudo-code; and includes instructions for the available execution environments and real code examples to get readers up and talking to the TPM quickly. You will learn: TPM 2.0 architecture fundamentals, including changes from TPM 1.2; TPM 2.0 security concepts; essential application development techniques; features of TPM 2.0; execution environments available for application development. -- | ||
546 | |a English. | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Data encryption (Computer science) | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Chiffrement (Informatique) | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Coding theory & cryptology | |
650 | 4 | |a Software Engineering | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computers ; Security ; General | |
650 | 4 | |a Computers ; Software Development & Engineering ; General | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data encryption (Computer science) | |
700 | 1 | |a Challener, David |e VerfasserIn |4 aut | |
700 | 1 | |a Goldman, Kenneth |e VerfasserIn |4 aut | |
776 | 1 | |z 1430265833 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1430265833 |
856 | 4 | 0 | |l TUM01 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781430265849/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047576901 |
---|---|
_version_ | 1818767313687543808 |
adam_text | |
any_adam_object | |
author | Arthur, Will Challener, David Goldman, Kenneth |
author_facet | Arthur, Will Challener, David Goldman, Kenneth |
author_role | aut aut aut |
author_sort | Arthur, Will |
author_variant | w a wa d c dc k g kg |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047576901 (DE-599)KEP047576901 (ORHE)9781430265849 |
dewey-full | 005.8/2 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/2 |
dewey-search | 005.8/2 |
dewey-sort | 15.8 12 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03253cam a22006612 4500</leader><controlfield tag="001">ZDB-30-ORH-047576901</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115833.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2015 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781430265849</subfield><subfield code="9">978-1-4302-6584-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1430265841</subfield><subfield code="9">1-4302-6584-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1430265833</subfield><subfield code="9">1-4302-6583-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781430265832</subfield><subfield code="9">978-1-4302-6583-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047576901</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047576901</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781430265849</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047576901</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">URY.</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM053000.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/2</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Arthur, Will</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="2"><subfield code="a">A practical guide to TPM 2.0</subfield><subfield code="b">using the Trusted Platform Module in the new age of security</subfield><subfield code="c">Will Arthur, David Challener, with Kenneth Goldman</subfield></datafield><datafield tag="246" ind1="3" ind2="3"><subfield code="a">Using the Trusted Platform Module in the new age of security</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[New York, NY]</subfield><subfield code="b">ApressOpen</subfield><subfield code="c">[2015]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">The expert's voice in secure computing</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - Place of publication taken from publisher's Web site. - Includes bibliographical references and index. - Online resource; title from title page (Safari, viewed April 15, 2015)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. It explains security concepts; describes the TPM 2.0 architecture and provides code and pseudo-code examples in parallel, from very simple concepts and code to highly complex concepts and pseudo-code; and includes instructions for the available execution environments and real code examples to get readers up and talking to the TPM quickly. You will learn: TPM 2.0 architecture fundamentals, including changes from TPM 1.2; TPM 2.0 security concepts; essential application development techniques; features of TPM 2.0; execution environments available for application development. --</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Chiffrement (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding theory & cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers ; Software Development & Engineering ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Challener, David</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Goldman, Kenneth</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">1430265833</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1430265833</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781430265849/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047576901 |
illustrated | Illustrated |
indexdate | 2024-12-18T08:47:54Z |
institution | BVB |
isbn | 9781430265849 1430265841 1430265833 9781430265832 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (1 volume) illustrations |
psigel | ZDB-30-ORH |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | ApressOpen |
record_format | marc |
series2 | The expert's voice in secure computing |
spelling | Arthur, Will VerfasserIn aut A practical guide to TPM 2.0 using the Trusted Platform Module in the new age of security Will Arthur, David Challener, with Kenneth Goldman Using the Trusted Platform Module in the new age of security [New York, NY] ApressOpen [2015] ©2015 1 online resource (1 volume) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier The expert's voice in secure computing Includes index. - Place of publication taken from publisher's Web site. - Includes bibliographical references and index. - Online resource; title from title page (Safari, viewed April 15, 2015) This book shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. It explains security concepts; describes the TPM 2.0 architecture and provides code and pseudo-code examples in parallel, from very simple concepts and code to highly complex concepts and pseudo-code; and includes instructions for the available execution environments and real code examples to get readers up and talking to the TPM quickly. You will learn: TPM 2.0 architecture fundamentals, including changes from TPM 1.2; TPM 2.0 security concepts; essential application development techniques; features of TPM 2.0; execution environments available for application development. -- English. Computer security Data encryption (Computer science) Computer networks Security measures Sécurité informatique Chiffrement (Informatique) Réseaux d'ordinateurs ; Sécurité ; Mesures Coding theory & cryptology Software Engineering Computers ; Security ; General Computers ; Software Development & Engineering ; General Computer networks ; Security measures Challener, David VerfasserIn aut Goldman, Kenneth VerfasserIn aut 1430265833 Erscheint auch als Druck-Ausgabe 1430265833 TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781430265849/?ar X:ORHE Aggregator lizenzpflichtig Volltext |
spellingShingle | Arthur, Will Challener, David Goldman, Kenneth A practical guide to TPM 2.0 using the Trusted Platform Module in the new age of security Computer security Data encryption (Computer science) Computer networks Security measures Sécurité informatique Chiffrement (Informatique) Réseaux d'ordinateurs ; Sécurité ; Mesures Coding theory & cryptology Software Engineering Computers ; Security ; General Computers ; Software Development & Engineering ; General Computer networks ; Security measures |
title | A practical guide to TPM 2.0 using the Trusted Platform Module in the new age of security |
title_alt | Using the Trusted Platform Module in the new age of security |
title_auth | A practical guide to TPM 2.0 using the Trusted Platform Module in the new age of security |
title_exact_search | A practical guide to TPM 2.0 using the Trusted Platform Module in the new age of security |
title_full | A practical guide to TPM 2.0 using the Trusted Platform Module in the new age of security Will Arthur, David Challener, with Kenneth Goldman |
title_fullStr | A practical guide to TPM 2.0 using the Trusted Platform Module in the new age of security Will Arthur, David Challener, with Kenneth Goldman |
title_full_unstemmed | A practical guide to TPM 2.0 using the Trusted Platform Module in the new age of security Will Arthur, David Challener, with Kenneth Goldman |
title_short | A practical guide to TPM 2.0 |
title_sort | practical guide to tpm 2 0 using the trusted platform module in the new age of security |
title_sub | using the Trusted Platform Module in the new age of security |
topic | Computer security Data encryption (Computer science) Computer networks Security measures Sécurité informatique Chiffrement (Informatique) Réseaux d'ordinateurs ; Sécurité ; Mesures Coding theory & cryptology Software Engineering Computers ; Security ; General Computers ; Software Development & Engineering ; General Computer networks ; Security measures |
topic_facet | Computer security Data encryption (Computer science) Computer networks Security measures Sécurité informatique Chiffrement (Informatique) Réseaux d'ordinateurs ; Sécurité ; Mesures Coding theory & cryptology Software Engineering Computers ; Security ; General Computers ; Software Development & Engineering ; General Computer networks ; Security measures |
url | https://learning.oreilly.com/library/view/-/9781430265849/?ar |
work_keys_str_mv | AT arthurwill apracticalguidetotpm20usingthetrustedplatformmoduleinthenewageofsecurity AT challenerdavid apracticalguidetotpm20usingthetrustedplatformmoduleinthenewageofsecurity AT goldmankenneth apracticalguidetotpm20usingthetrustedplatformmoduleinthenewageofsecurity AT arthurwill usingthetrustedplatformmoduleinthenewageofsecurity AT challenerdavid usingthetrustedplatformmoduleinthenewageofsecurity AT goldmankenneth usingthetrustedplatformmoduleinthenewageofsecurity AT arthurwill practicalguidetotpm20usingthetrustedplatformmoduleinthenewageofsecurity AT challenerdavid practicalguidetotpm20usingthetrustedplatformmoduleinthenewageofsecurity AT goldmankenneth practicalguidetotpm20usingthetrustedplatformmoduleinthenewageofsecurity |