Return to home page
Searching: Muskingum library catalog
In response to the COVID-19 outbreak, statewide lending via OhioLINK and SearchOhio has been suspended. OPAL member libraries have closed or are operating at reduced service levels. Please contact your library with specific lending requests or if you need assistance.
  Previous Record Previous Item Next Item Next Record
  Reviews, Summaries, etc...
EBOOK
Author Arthur, Will,
Title A practical guide to TPM 2.0 : using the Trusted Platform Module in the new age of security / Will Arthur, David Challener, with Kenneth Goldman.
Imprint [New York, NY] : ApressOpen, [2015]
New York, NY : Distributed to the Book trade worldwide by Springer Science+Media New York
2015

LOCATION CALL # STATUS MESSAGE
 OHIOLINK SAFARI EBOOKS    ONLINE  
View online
Author Arthur, Will,
Series The expert's voice in secure computing
Expert's voice in secure computing. http://id.loc.gov/authorities/names/no2016159392
Subject Computer security.
Data encryption (Computer science)
Computer networks -- Security measures.
Alt Name Challener, David,
Goldman, Kenneth,
Add Title Using the Trusted Platform Module in the new age of security
LOCATION CALL # STATUS MESSAGE
 OHIOLINK SAFARI EBOOKS    ONLINE  
View online
Author Arthur, Will,
Series The expert's voice in secure computing
Expert's voice in secure computing. http://id.loc.gov/authorities/names/no2016159392
Subject Computer security.
Data encryption (Computer science)
Computer networks -- Security measures.
Alt Name Challener, David,
Goldman, Kenneth,
Add Title Using the Trusted Platform Module in the new age of security
Description 1 online resource (1 volume) : illustrations.
Note Includes index.
Place of publication taken from publisher's Web site.
Bibliography Note Includes bibliographical references and index.
Summary This book shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. It explains security concepts; describes the TPM 2.0 architecture and provides code and pseudo-code examples in parallel, from very simple concepts and code to highly complex concepts and pseudo-code; and includes instructions for the available execution environments and real code examples to get readers up and talking to the TPM quickly. You will learn: TPM 2.0 architecture fundamentals, including changes from TPM 1.2; TPM 2.0 security concepts; essential application development techniques; features of TPM 2.0; execution environments available for application development. -- Edited summary from book.
Note Online resource; title from title page (Safari, viewed April 15, 2015).
ISBN 9781430265849
1430265841
1430265833
9781430265832
9781430265832
OCLC # 908031861