354,41 €
393,79 €
-10% with code: EXTRA
Trusted Computing Platforms
Trusted Computing Platforms
354,41
393,79 €
  • We will send in 10–14 business days.
In this book the authors first describe the background of trusted platforms and trusted computing and speculate about the future. They then describe the technical features and architectures of trusted platforms from several different perspectives, finally explaining second-generation TPMs, including a technical description intended to supplement the Trusted Computing Group's TPM2 specifications. The intended audience is IT managers and engineers and graduate students in information security.
  • Publisher:
  • ISBN-10: 3319087436
  • ISBN-13: 9783319087436
  • Format: 15.6 x 23.4 x 2.2 cm, hardcover
  • Language: English
  • SAVE -10% with code: EXTRA

Trusted Computing Platforms (e-book) (used book) | bookbook.eu

Reviews

Description

In this book the authors first describe the background of trusted platforms and trusted computing and speculate about the future. They then describe the technical features and architectures of trusted platforms from several different perspectives, finally explaining second-generation TPMs, including a technical description intended to supplement the Trusted Computing Group's TPM2 specifications. The intended audience is IT managers and engineers and graduate students in information security.

EXTRA 10 % discount with code: EXTRA

354,41
393,79 €
We will send in 10–14 business days.

The promotion ends in 18d.02:10:47

The discount code is valid when purchasing from 10 €. Discounts do not stack.

Log in and for this item
you will receive 3,94 Book Euros!?
  • Author: Graeme Proudler
  • Publisher:
  • ISBN-10: 3319087436
  • ISBN-13: 9783319087436
  • Format: 15.6 x 23.4 x 2.2 cm, hardcover
  • Language: English English

In this book the authors first describe the background of trusted platforms and trusted computing and speculate about the future. They then describe the technical features and architectures of trusted platforms from several different perspectives, finally explaining second-generation TPMs, including a technical description intended to supplement the Trusted Computing Group's TPM2 specifications. The intended audience is IT managers and engineers and graduate students in information security.

Reviews

  • No reviews
0 customers have rated this item.
5
0%
4
0%
3
0%
2
0%
1
0%
(will not be displayed)