000 04127nam a22008415i 4500
001 9783110477597
003 DE-B1597
005 20240730161857.0
006 m|||||o||d||||||||
007 cr || ||||||||
008 230228t20172018gw fo d z eng d
020 _a9783110477597
024 7 _a10.1515/9783110477597
_2doi
035 _a(DE-B1597)465996
035 _a(OCoLC)1020032345
040 _aDE-B1597
_beng
_cDE-B1597
_erda
041 0 _aeng
044 _agw
_cDE
050 4 _aQA76.9.A25
_b.T787 2018
072 7 _aCOM043050
_2bisacsh
082 0 4 _a005.8
_223
100 1 _aFeng, Dengguo,
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_978242
245 1 0 _aTrusted Computing :
_bPrinciples and Applications /
_cDengguo Feng.
264 1 _aBerlin ;
_aBoston :
_bDe Gruyter,
_c[2017]
264 4 _c©2018
300 _a1 online resource (XI, 300 p.)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 0 _aAdvances in Computer Science ,
_x2509-7253 ;
_v2
505 0 0 _tFrontmatter --
_tPreface --
_tContents --
_t1. Introduction --
_t2. Trusted Platform Module --
_t3. Building Chain of Trust --
_t4. Trusted Software Stack --
_t5. Trusted Computing Platform --
_t6. Test and Evaluation of Trusted Computing --
_t7. Remote Attestation --
_t8. Trust Network Connection --
_tAppendix A: Foundations of Cryptography --
_tReferences --
_tIndex
506 0 _arestricted access
_uhttp://purl.org/coar/access_right/c_16ec
_fonline access with authorization
_2star
520 _aThe book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.
530 _aIssued also in print.
538 _aMode of access: Internet via World Wide Web.
546 _aIn English.
588 0 _aDescription based on online resource; title from PDF title page (publisher's Web site, viewed 28. Feb 2023)
650 0 _aInformation technology
_xManagement.
_95368
650 0 _aInformation technology
_xSecurity measures.
_910189
650 7 _aCOMPUTERS / Security / Networking.
_2bisacsh
_95159
700 1 _aTsinghua University Press,
_econtributor.
_4ctb
_4https://id.loc.gov/vocabulary/relators/ctb
_975695
773 0 8 _iTitle is part of eBook package:
_dDe Gruyter
_tDG Plus DeG Package 2018 Part 1
_z9783110762488
773 0 8 _iTitle is part of eBook package:
_dDe Gruyter
_tDG Plus eBook-Package 2018
_z9783110719550
773 0 8 _iTitle is part of eBook package:
_dDe Gruyter
_tEBOOK PACKAGE COMPLETE 2017
_z9783110540550
_oZDB-23-DGG
773 0 8 _iTitle is part of eBook package:
_dDe Gruyter
_tEBOOK PACKAGE COMPLETE ENGLISH 2017
_z9783110625264
773 0 8 _iTitle is part of eBook package:
_dDe Gruyter
_tEBOOK PACKAGE Engineering, Computer Sciences 2017
_z9783110547757
_oZDB-23-DEI
776 0 _cEPUB
_z9783110476095
776 0 _cprint
_z9783110476040
856 4 0 _uhttps://doi.org/10.1515/9783110477597
856 4 0 _uhttps://www.degruyter.com/isbn/9783110477597
856 4 2 _3Cover
_uhttps://www.degruyter.com/document/cover/isbn/9783110477597/original
912 _a978-3-11-062526-4 EBOOK PACKAGE COMPLETE ENGLISH 2017
_b2017
912 _a978-3-11-071955-0 DG Plus eBook-Package 2018
_b2018
912 _a978-3-11-076248-8 DG Plus DeG Package 2018 Part 1
_b2018
912 _aEBA_BACKALL
912 _aEBA_CL_CHCOMSGSEN
912 _aEBA_DGALL
912 _aEBA_EBACKALL
912 _aEBA_EBKALL
912 _aEBA_ECL_CHCOMSGSEN
912 _aEBA_EEBKALL
912 _aEBA_ESTMALL
912 _aEBA_STMALL
912 _aGBV-deGruyter-alles
912 _aPDA12STME
912 _aPDA13ENGE
912 _aPDA18STMEE
912 _aPDA5EBK
912 _aZDB-23-DEI
_b2017
912 _aZDB-23-DGG
_b2017
942 _cEBK
999 _c84576
_d84576