Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters (Record no. 64369)

MARC details
000 -LEADER
fixed length control field 01928naaaa2200277uu 4500
001 - CONTROL NUMBER
control field https://directory.doabooks.org/handle/20.500.12854/50408
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220220041154.0
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number /doi.org/10.1007/978-1-4302-6149-0
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781430261483
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781430261490
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code https://doi.org/10.1007/978-1-4302-6149-0
Terms of availability doi
041 0# - LANGUAGE CODE
Language code of text/sound track or separate title English
042 ## - AUTHENTICATION CODE
Authentication code dc
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name William Futral
Relationship auth
245 10 - TITLE STATEMENT
Title Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Name of publisher, distributor, etc. Apress
Date of publication, distribution, etc. 2013
300 ## - PHYSICAL DESCRIPTION
Extent 1 electronic resource (156 p.)
506 0# - RESTRICTIONS ON ACCESS NOTE
Terms governing access Open Access
Source of term star
Standardized terminology for access restriction Unrestricted online access
520 ## - SUMMARY, ETC.
Summary, etc. Intel® Trusted Execution Technology (Intel TXT) is a new security technology that started appearing on Intel server platforms in 2010. This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations. This book guides the server administrator / datacenter manager in enabling the technology as well as establishing a launch control policy that he can use to customize the server’s boot process to fit the datacenter’s requirements. This book explains how the OS (typically a Virtual Machine Monitor or Hypervisor) and supporting software can build on the secure facilities afforded by Intel TXT to provide additional security features and functions. It provides examples how the datacenter can create and use trusted pools.
536 ## - FUNDING INFORMATION NOTE
Text of note Intel
540 ## - TERMS GOVERNING USE AND REPRODUCTION NOTE
Terms governing use and reproduction Creative Commons
Use and reproduction rights https://creativecommons.org/licenses/by-nc-nd/4.0/
Source of term cc
-- https://creativecommons.org/licenses/by-nc-nd/4.0/
546 ## - LANGUAGE NOTE
Language note English
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name James Greene
Relationship auth
856 40 - ELECTRONIC LOCATION AND ACCESS
Host name www.oapen.org
Uniform Resource Identifier <a href="https://link.springer.com/book/10.1007/978-1-4302-6149-0">https://link.springer.com/book/10.1007/978-1-4302-6149-0</a>
Access status 0
Public note DOAB: download the publication
856 40 - ELECTRONIC LOCATION AND ACCESS
Host name www.oapen.org
Uniform Resource Identifier <a href="https://directory.doabooks.org/handle/20.500.12854/50408">https://directory.doabooks.org/handle/20.500.12854/50408</a>
Access status 0
Public note DOAB: description of the publication

No items available.