logo
Product categories

EbookNice.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link.  https://ebooknice.com/page/post?id=faq


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookNice Team

(Ebook) Trusted Platform Modules: Why, When and How to Use Them by Ariel Segall ISBN 9781849198936, 9781849198943, 1849198934, 1849198942

  • SKU: EBN-6839058
Zoomable Image
$ 32 $ 40 (-20%)

Status:

Available

5.0

32 reviews
Instant download (eBook) Trusted Platform Modules: Why, When and How to Use Them after payment.
Authors:Ariel Segall
Pages:400 pages.
Year:2017
Editon:Reprint
Publisher:The Institution of Engineering and Technology
Language:english
File Size:5.65 MB
Format:pdf
ISBNS:9781849198936, 9781849198943, 1849198934, 1849198942
Categories: Ebooks

Product desciption

(Ebook) Trusted Platform Modules: Why, When and How to Use Them by Ariel Segall ISBN 9781849198936, 9781849198943, 1849198934, 1849198942

Trusted Platform Modules (TPMs) are small, inexpensive chips which provide a limited set of security functions. They are most commonly found as a motherboard component in laptops and desktops aimed at the corporate or government markets, but can also be found in many consumer-grade machines and servers or purchased as independent components.This book describes the primary uses for TPMs and practical considerations such as: when TPMs can and should be used, when they shouldn’t be used, what advantages they provide and how to benefit from them.Topics covered include:* When to use a TPM* TPM concepts and functionality* Programming introduction* Provisioning: getting the TPM ready to use* First steps: TPM keys, machine authentication, data protection, attestation* Other TPM features* Software and specifications* Troubleshooting* Appendices contain basic cryptographic concepts, command equivalence, requirements charts and complete code samples
*Free conversion of into popular formats such as PDF, DOCX, DOC, AZW, EPUB, and MOBI after payment.

Related Products