LEADER 03581nam 22007215 450 001 9910298976903321 005 20200630080824.0 010 $a3-319-08744-4 024 7 $a10.1007/978-3-319-08744-3 035 $a(CKB)3710000000332416 035 $a(EBL)1965460 035 $a(OCoLC)900158058 035 $a(SSID)ssj0001424636 035 $a(PQKBManifestationID)11766588 035 $a(PQKBTitleCode)TC0001424636 035 $a(PQKBWorkID)11376463 035 $a(PQKB)10020007 035 $a(MiAaPQ)EBC1965460 035 $a(DE-He213)978-3-319-08744-3 035 $a(PPN)183516613 035 $a(EXLCZ)993710000000332416 100 $a20150108d2014 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aTrusted Computing Platforms $eTPM2.0 in Context /$fby Graeme Proudler, Liqun Chen, Chris Dalton 205 $a1st ed. 2014. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2014. 215 $a1 online resource (393 p.) 300 $aDescription based upon print version of record. 311 $a3-319-08743-6 320 $aIncludes bibliographical references and index. 327 $aIntroduction to Trusted Computing -- Futures for Trusted Computing -- Basics of Trusted Platforms -- Trusted Platform Architecture -- TPM2 Requirements -- TPM2 Operation -- Initialising TPM2 -- Managing TPM2 -- Accessing Keys and Data in TPM2 -- Customer Configuration of TPM2 and Its Host Platform -- Starting to Use TPM2 -- Direct Anonymous Attestation (DAA) in More Depth -- Machine Virtualisation, Virtual Machines, and TPMs -- Index. 330 $aIn this book the authors first describe the background of trusted platforms and trusted computing, and speculate about the future. They then describe the technical features and architectures of trusted platforms from several different perspectives, finally explaining second-generation TPMs, including a technical description intended to supplement the Trusted Computing Group's TPM2 specifications. The intended audience is IT managers and engineers, and graduate students in information security. 606 $aComputer security 606 $aData encryption (Computer science) 606 $aElectrical engineering 606 $aSystem safety 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aCommunications Engineering, Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/T24035 606 $aSecurity Science and Technology$3https://scigraph.springernature.com/ontologies/product-market-codes/P31080 615 0$aComputer security. 615 0$aData encryption (Computer science). 615 0$aElectrical engineering. 615 0$aSystem safety. 615 14$aSystems and Data Security. 615 24$aCryptology. 615 24$aCommunications Engineering, Networks. 615 24$aSecurity Science and Technology. 676 $a004 676 $a005.8 676 $a005.82 676 $a621.382 700 $aProudler$b Graeme$4aut$4http://id.loc.gov/vocabulary/relators/aut$0904547 702 $aChen$b Liqun$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aDalton$b Chris$4aut$4http://id.loc.gov/vocabulary/relators/aut 906 $aBOOK 912 $a9910298976903321 996 $aTrusted Computing Platforms$92022596 997 $aUNINA