A Practical Guide to TPM 2.0: Using the New Trusted Platform Module in the New Age of Security (Record no. 46160)

MARC details
000 -LEADER
fixed length control field 02137naaaa2200277uu 4500
001 - CONTROL NUMBER
control field https://directory.doabooks.org/handle/20.500.12854/56804
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220219215256.0
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number /doi.org/10.1007/978-1-4302-6584-9
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781430265849
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781430265832
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code https://doi.org/10.1007/978-1-4302-6584-9
Terms of availability doi
041 0# - LANGUAGE CODE
Language code of text/sound track or separate title English
042 ## - AUTHENTICATION CODE
Authentication code dc
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name David Challener
Relationship auth
245 10 - TITLE STATEMENT
Title A Practical Guide to TPM 2.0: Using the New Trusted Platform Module in the New Age of Security
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Name of publisher, distributor, etc. Apress
Date of publication, distribution, etc. 2015
300 ## - PHYSICAL DESCRIPTION
Extent 1 electronic resource (392 p.)
506 0# - RESTRICTIONS ON ACCESS NOTE
Terms governing access Open Access
Source of term star
Standardized terminology for access restriction Unrestricted online access
520 ## - SUMMARY, ETC.
Summary, etc. A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM. The approach is to ramp the reader up quickly and keep their interest.A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security explains security concepts, describes the TPM 2.0 architecture, and provides code and pseudo-code examples in parallel, from very simple concepts and code to highly complex concepts and pseudo-code. The book includes instructions for the available execution environments and real code examples to get readers up and talking to the TPM quickly. The authors then help the users expand on that with pseudo-code descriptions of useful applications using the TPM.
536 ## - FUNDING INFORMATION NOTE
Text of note Intel
540 ## - TERMS GOVERNING USE AND REPRODUCTION NOTE
Terms governing use and reproduction Creative Commons
Use and reproduction rights https://creativecommons.org/licenses/by-nc-nd/4.0/
Source of term cc
-- https://creativecommons.org/licenses/by-nc-nd/4.0/
546 ## - LANGUAGE NOTE
Language note English
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Will Arthur
Relationship auth
856 40 - ELECTRONIC LOCATION AND ACCESS
Host name www.oapen.org
Uniform Resource Identifier <a href="https://link.springer.com/book/10.1007/978-1-4302-6584-9">https://link.springer.com/book/10.1007/978-1-4302-6584-9</a>
Access status 0
Public note DOAB: download the publication
856 40 - ELECTRONIC LOCATION AND ACCESS
Host name www.oapen.org
Uniform Resource Identifier <a href="https://directory.doabooks.org/handle/20.500.12854/56804">https://directory.doabooks.org/handle/20.500.12854/56804</a>
Access status 0
Public note DOAB: description of the publication

No items available.