sábado, 16 de febrero de 2008

A Practical Guide to Trusted Computing

Every year, computer security threats become more severe. Software alone can no longer adequately defend against them: what’s needed is secure hardware. The Trusted Platform Module (TPM) makes that possible by providing a complete, open industry standard for implementing trusted computing hardware subsystems in PCs. Already available from virtually every leading PC manufacturer, TPM gives software professionals powerful new ways to protect their customers. Now, there’s a start-to-finish guide for every software professional and security specialist who wants to utilize this breakthrough security technology.

Edición: IBM Press (2008)
Idioma: Inglés
Formato: PDF

Contenido:

  1. Introduction to Trusted Computing
  2. Design Goals of the Trusted Platform Module
  3. An Overview of the Trusted Platform Module Capabilities
  4. Writing a TPM Device Driver
  5. Low-Level Software: Using BIOS and TDDL Directly
  6. Trusted Boot
  7. The TCG Software Stack
  8. Using TPM Keys
  9. Using Symmetric Keys
  10. The TSS Core Service (TCS)
  11. Public Key Cryptography Standard #11
  12. Trusted Computing and Secure Storage
  13. Trusted Computing and Secure Identification
  14. Administration of Trusted Devices
  15. Ancillary Hardware
  16. Moving from TSS 1.1 to TSS 1.2
  17. Appendix A: TPM Command Reference
  18. Appendix B: TSS Command Reference
  19. Appendix C: Function Library
  20. Appendix D: TSS Functions Grouped by Object and API Level

Descarga/Download

No hay comentarios: