Home Security related

Trusted Computing


ADVERTISEMENTS
DOWNLOAD READ ONLINE NOW


e Gruyter | English | 2018 | ISBN-10: 3110476045 | 230 Pages | PDF | 3.68 mb
by Dengguo Feng (Author),? Tsinghua University Press (Contributor)

The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.
ADVERTISEMENTS
DOWNLOAD READ ONLINE NOW

NEWER EBOOKS

Related Security related Ebooks And Managines :

ADVERTISEMENT:




Copyright Disclaimer |Policy | Email Contact: info@NewFreeEbook.com