BOOKS - NETWORK TECHNOLOGIES - Trusted Computing Principles and Applications
US $6.86
826498
826498
Trusted Computing Principles and Applications
Author: Dengguo Feng, Yu Qin, Xiaobo Chu, Shijun Zhao
Year: 2018
Number of pages: 230
Format: PDF | EPUB
File size: 18.6 MB
Language: ENG
Year: 2018
Number of pages: 230
Format: PDF | EPUB
File size: 18.6 MB
Language: ENG
The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers. With further development of computer network, the three most prominent threats are gradually highlighted, including attacks from malicious code, illegal stealing of information and illegal corruption of data and system. Within these threats, attacks from malicious code have surpassed traditional computer virus to be the predominant threat to private information of computer users.