In response to the COVID-19 outbreak, statewide lending via OhioLINK and SearchOhio has been suspended. OPAL member libraries have closed or are operating at reduced service levels. Please contact your library with specific lending requests or if you need assistance.
Your session will expire automatically in 0 seconds.
Using the Trusted Platform Module in the new age of security
1 online resource (1 volume) : illustrations.
Place of publication taken from publisher's Web site.
Includes bibliographical references and index.
This book shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. It explains security concepts; describes the TPM 2.0 architecture and provides code and pseudo-code examples in parallel, from very simple concepts and code to highly complex concepts and pseudo-code; and includes instructions for the available execution environments and real code examples to get readers up and talking to the TPM quickly. You will learn: TPM 2.0 architecture fundamentals, including changes from TPM 1.2; TPM 2.0 security concepts; essential application development techniques; features of TPM 2.0; execution environments available for application development. -- Edited summary from book.
Online resource; title from title page (Safari, viewed April 15, 2015).
Text this item to your phone! Text message will contain the location, call number, and title of the item on this page. Texting may not work for items with multiple volumes. WARNING: Texting fees may apply. close