01031nam0 2200277 450 00001268520080611110019.088-7153-244-920080611d1990----km-y0itay50------baitaITy-------001yy<<La >>ricerca e sviluppo nei principali paesi industrializzatiAiri, Associazione italiana per la ricerca industrialea cura di Anna CucuglielliRomaSIPIstampa 1990141 p.24 cmSeguono allegati.Progresso tecnico e sviluppo economicoPaesi industrializzatiRicerca scientificaPaesi industrializzati507.220Scienze pure. RicercaCucuglielli,AnnaAssociazione italiana per la ricerca industriale631439ITUNIPARTHENOPE20080611RICAUNIMARC000012685641/1610 LV CNRNAVA2Ricerca e sviluppo nei principali paesi industrializzati1202955UNIPARTHENOPE03581nam 22007215 450 991029897690332120200630080824.03-319-08744-410.1007/978-3-319-08744-3(CKB)3710000000332416(EBL)1965460(OCoLC)900158058(SSID)ssj0001424636(PQKBManifestationID)11766588(PQKBTitleCode)TC0001424636(PQKBWorkID)11376463(PQKB)10020007(MiAaPQ)EBC1965460(DE-He213)978-3-319-08744-3(PPN)183516613(EXLCZ)99371000000033241620150108d2014 u| 0engur|n|---|||||txtccrTrusted Computing Platforms TPM2.0 in Context /by Graeme Proudler, Liqun Chen, Chris Dalton1st ed. 2014.Cham :Springer International Publishing :Imprint: Springer,2014.1 online resource (393 p.)Description based upon print version of record.3-319-08743-6 Includes bibliographical references and index.Introduction to Trusted Computing -- Futures for Trusted Computing -- Basics of Trusted Platforms -- Trusted Platform Architecture -- TPM2 Requirements -- TPM2 Operation -- Initialising TPM2 -- Managing TPM2 -- Accessing Keys and Data in TPM2 -- Customer Configuration of TPM2 and Its Host Platform -- Starting to Use TPM2 -- Direct Anonymous Attestation (DAA) in More Depth -- Machine Virtualisation, Virtual Machines, and TPMs -- Index.In this book the authors first describe the background of trusted platforms and trusted computing, and speculate about the future. They then describe the technical features and architectures of trusted platforms from several different perspectives, finally explaining second-generation TPMs, including a technical description intended to supplement the Trusted Computing Group's TPM2 specifications. The intended audience is IT managers and engineers, and graduate students in information security.Computer securityData encryption (Computer science)Electrical engineeringSystem safetySystems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Communications Engineering, Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/T24035Security Science and Technologyhttps://scigraph.springernature.com/ontologies/product-market-codes/P31080Computer security.Data encryption (Computer science).Electrical engineering.System safety.Systems and Data Security.Cryptology.Communications Engineering, Networks.Security Science and Technology.004005.8005.82621.382Proudler Graemeauthttp://id.loc.gov/vocabulary/relators/aut904547Chen Liqunauthttp://id.loc.gov/vocabulary/relators/autDalton Chrisauthttp://id.loc.gov/vocabulary/relators/autBOOK9910298976903321Trusted Computing Platforms2022596UNINA