01121nam0 22002893i 450 SUN013403120210429112905.215978-88-08-16282-30.0020210429d2010 |0itac50 baitaIT|||| |||||*Caratteri, testo, gabbiaguida critica alla progettazione graficadi Ellen Luptonedizione italiana a cura di Marco Brazzali e Remigio DecarliBolognaZanichelli2010191 p.ill24 cm.COMPOSIZIONE TIPOGRAFICAARSUNC036226BolognaSUNL000003686.2254453621Lupton, EllenSUNV107833626544Brazzali, MarcoSUNV107834Decarli, RemigioSUNV107835ZanichelliSUNV004332650ITSOL20210503RICASUN0134031BIBLIOTECA DEL DIPARTIMENTO DI ARCHITETTURA E DISEGNO INDUSTRIALE01CONS T-ESAME199 01BDA1639 20210429 Caratteri, testo, gabbia1773109UNICAMPANIA03580nam 22007215 450 991029897690332120200630080824.03-319-08744-410.1007/978-3-319-08744-3(CKB)3710000000332416(EBL)1965460(OCoLC)900158058(SSID)ssj0001424636(PQKBManifestationID)11766588(PQKBTitleCode)TC0001424636(PQKBWorkID)11376463(PQKB)10020007(MiAaPQ)EBC1965460(DE-He213)978-3-319-08744-3(PPN)183516613(EXLCZ)99371000000033241620150108d2014 u| 0engur|n|---|||||txtccrTrusted Computing Platforms TPM2.0 in Context /by Graeme Proudler, Liqun Chen, Chris Dalton1st ed. 2014.Cham :Springer International Publishing :Imprint: Springer,2014.1 online resource (393 p.)Description based upon print version of record.3-319-08743-6 Includes bibliographical references and index.Introduction to Trusted Computing -- Futures for Trusted Computing -- Basics of Trusted Platforms -- Trusted Platform Architecture -- TPM2 Requirements -- TPM2 Operation -- Initialising TPM2 -- Managing TPM2 -- Accessing Keys and Data in TPM2 -- Customer Configuration of TPM2 and Its Host Platform -- Starting to Use TPM2 -- Direct Anonymous Attestation (DAA) in More Depth -- Machine Virtualisation, Virtual Machines, and TPMs -- Index.In this book the authors first describe the background of trusted platforms and trusted computing, and speculate about the future. They then describe the technical features and architectures of trusted platforms from several different perspectives, finally explaining second-generation TPMs, including a technical description intended to supplement the Trusted Computing Group's TPM2 specifications. The intended audience is IT managers and engineers, and graduate students in information security.Computer securityData encryption (Computer science)Electrical engineeringSystem safetySystems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Communications Engineering, Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/T24035Security Science and Technologyhttps://scigraph.springernature.com/ontologies/product-market-codes/P31080Computer security.Data encryption (Computer science)Electrical engineering.System safety.Systems and Data Security.Cryptology.Communications Engineering, Networks.Security Science and Technology.004005.8005.82621.382Proudler Graemeauthttp://id.loc.gov/vocabulary/relators/aut904547Chen Liqunauthttp://id.loc.gov/vocabulary/relators/autDalton Chrisauthttp://id.loc.gov/vocabulary/relators/autBOOK9910298976903321Trusted Computing Platforms2022596UNINA