Your shopping cart
😊 Product added to cart successfully   Product removed to cart successfully
Your shopping cart is empty!
Continue shopping
1 of 2

A Practical Guide to Trusted Computing-Kent Yoder

Regular price
$19.99
Sale price
$19.99
Regular price
**A Practical Guide to Trusted Computing** by David Challener, Kent Yoder and Ryan Catherman is an essential resource for software professionals and security specialists seeking to utilize the Trusted Platform...
Type: EBOOK
Vendor:
Sku: 366642

Tags:
A Practical Guide to Trusted Computing-Kent Yoder
**A Practical Guide to Trusted Computing** by David Challener, Kent Yoder and Ryan Catherman is an essential resource for software professionals and security specialists seeking to utilize the Trusted Platform Module (TPM) for enhanced security. This comprehensive guide delves into the intricacies of TPM technology, covering its capabilities, functionalities, and application development.

The authors, pioneers in TPM development and implementation, provide real-world insights into both TPM and the Trusted Computing Group (TCG) Software Stack. The book explores the services and capabilities offered by TPMs, encompassing key management techniques, including key creation, storage, loading, migration, and utilization of symmetric keys. It also examines TPM device drivers, solutions for code running in BIOS, TSS stacks for new operating systems, and memory-constrained environments.

Furthermore, the book elucidates the use of TPM in enhancing the security of a PC's boot sequence. It delves into the connection between PKCS#11 and TSS stacks to support applications with middleware services, addressing critical aspects of TPM and privacy, including methods for avoiding privacy issues. The guide also navigates the transition from TSS 1.1 to the new TSS 1.2 standard, providing comprehensive command references and a complete function library.

Through four in-depth case studies, each accompanied by extensive C-based code examples, the book demonstrates how TPM can effectively address today's most challenging security problems. This practical guide equips readers with the knowledge and tools to leverage the power of TPM technology, securing PCs and building robust, reliable systems.
Sale

Unavailable

Sold Out