A Practical Guide to TPM 2.0: Using the New Trusted Platform Module in the New Age of Security (Record no. 46160)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 02137naaaa2200277uu 4500 |
| 001 - CONTROL NUMBER | |
| control field | https://directory.doabooks.org/handle/20.500.12854/56804 |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20220219215256.0 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | /doi.org/10.1007/978-1-4302-6584-9 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9781430265849 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9781430265832 |
| 024 7# - OTHER STANDARD IDENTIFIER | |
| Standard number or code | https://doi.org/10.1007/978-1-4302-6584-9 |
| Terms of availability | doi |
| 041 0# - LANGUAGE CODE | |
| Language code of text/sound track or separate title | English |
| 042 ## - AUTHENTICATION CODE | |
| Authentication code | dc |
| 100 1# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | David Challener |
| Relationship | auth |
| 245 10 - TITLE STATEMENT | |
| Title | A Practical Guide to TPM 2.0: Using the New Trusted Platform Module in the New Age of Security |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Name of publisher, distributor, etc. | Apress |
| Date of publication, distribution, etc. | 2015 |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | 1 electronic resource (392 p.) |
| 506 0# - RESTRICTIONS ON ACCESS NOTE | |
| Terms governing access | Open Access |
| Source of term | star |
| Standardized terminology for access restriction | Unrestricted online access |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM. The approach is to ramp the reader up quickly and keep their interest.A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security explains security concepts, describes the TPM 2.0 architecture, and provides code and pseudo-code examples in parallel, from very simple concepts and code to highly complex concepts and pseudo-code. The book includes instructions for the available execution environments and real code examples to get readers up and talking to the TPM quickly. The authors then help the users expand on that with pseudo-code descriptions of useful applications using the TPM. |
| 536 ## - FUNDING INFORMATION NOTE | |
| Text of note | Intel |
| 540 ## - TERMS GOVERNING USE AND REPRODUCTION NOTE | |
| Terms governing use and reproduction | Creative Commons |
| Use and reproduction rights | https://creativecommons.org/licenses/by-nc-nd/4.0/ |
| Source of term | cc |
| -- | https://creativecommons.org/licenses/by-nc-nd/4.0/ |
| 546 ## - LANGUAGE NOTE | |
| Language note | English |
| 700 1# - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Will Arthur |
| Relationship | auth |
| 856 40 - ELECTRONIC LOCATION AND ACCESS | |
| Host name | www.oapen.org |
| Uniform Resource Identifier | <a href="https://link.springer.com/book/10.1007/978-1-4302-6584-9">https://link.springer.com/book/10.1007/978-1-4302-6584-9</a> |
| Access status | 0 |
| Public note | DOAB: download the publication |
| 856 40 - ELECTRONIC LOCATION AND ACCESS | |
| Host name | www.oapen.org |
| Uniform Resource Identifier | <a href="https://directory.doabooks.org/handle/20.500.12854/56804">https://directory.doabooks.org/handle/20.500.12854/56804</a> |
| Access status | 0 |
| Public note | DOAB: description of the publication |
No items available.
