Every year, computer security threats become more severe. Software alone can no longer adequately defend against them: what’s needed is secure hardware. The Trusted Platform Module (TPM) makes that possible by providing a complete, open industry standard for implementing trusted computing hardware subsystems in PCs. Already available from virtually every leading PC manufacturer, TPM gives software professionals powerful new ways to protect their customers. Now, there’s a start-to-finish guide for every software professional and security specialist who wants to utilize this breakthrough security technology.
Edición: IBM Press (2008)
Idioma: Inglés
Formato: PDF
Contenido:
- Introduction to Trusted Computing
- Design Goals of the Trusted Platform Module
- An Overview of the Trusted Platform Module Capabilities
- Writing a TPM Device Driver
- Low-Level Software: Using BIOS and TDDL Directly
- Trusted Boot
- The TCG Software Stack
- Using TPM Keys
- Using Symmetric Keys
- The TSS Core Service (TCS)
- Public Key Cryptography Standard #11
- Trusted Computing and Secure Storage
- Trusted Computing and Secure Identification
- Administration of Trusted Devices
- Ancillary Hardware
- Moving from TSS 1.1 to TSS 1.2
- Appendix A: TPM Command Reference
- Appendix B: TSS Command Reference
- Appendix C: Function Library
- Appendix D: TSS Functions Grouped by Object and API Level
Descarga/Download
No hay comentarios:
Publicar un comentario