• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
  • ورود / ثبت نام

عنوان
A practical guide to trusted computing /

پدید آورنده
David Challener [and others].

موضوع
Computer security.,Embedded computer systems.,Programmable controllers.,Computer Science.,Computer security.,Computer security.,Computersicherheit,Electrical & Computer Engineering.,Electrical Engineering.,Embedded computer systems.,Embedded computer systems.,Engineering & Applied Sciences.,Freeware,Programmable controllers.,Programmable controllers.,Trusted Computing

رده
TK7895
.
E42
P73
2008

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
0132398427
(Number (ISBN
0132704390
(Number (ISBN
9780132398428
(Number (ISBN
9780132704397

NATIONAL BIBLIOGRAPHY NUMBER

Number
b705551

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
A practical guide to trusted computing /
General Material Designation
[Book]
First Statement of Responsibility
David Challener [and others].

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
Upper Saddle River, N.J. :
Name of Publisher, Distributor, etc.
IBM Press/Pearson plc,
Date of Publication, Distribution, etc.
©2008.

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
1 online resource (xxviii, 347 pages) :
Other Physical Details
illustrations

INTERNAL BIBLIOGRAPHIES/INDEXES NOTE

Text of Note
Includes bibliographical references and index.

CONTENTS NOTE

Text of Note
pt. I. Background Material -- Ch. 1. Introduction to Trusted Computing -- Ch. 2. Design Goals of the Trusted Platform Module -- Ch. 3. An Overview of the Trusted Platform Module Capabilities -- pt. II. Programming Interfaces to TCG -- Ch. 4. Writing a TPM Device Driver -- Ch. 5. Low-Level Software: Using BIOS and TDDL Directly -- Ch. 6. Trusted Boot -- Ch. 7. The TCG Software Stack -- Ch. 8. Using TPM Keys -- Ch. 9. Using Symmetric Keys -- Ch. 10. The TSS Core Service (TCS) -- Ch. 11. Public Key Cryptography Standard #11 -- pt. III. Architectures -- Ch. 12. Trusted Computing and Secure Storage -- Ch. 13. Trusted Computing and Secure Identification -- Ch. 14. Administration of Trusted Devices -- Ch. 15. Ancillary Hardware -- Ch. 16. Moving from TSS 1.1 to TSS 1.2 -- pt. IV. Appendixes -- App. A. TPM Command Reference -- App. B. TSS Command Reference -- App. C. Function Library -- App. D. TSS Functions Grouped by Object and API Level.
0

SYSTEM REQUIREMENTS NOTE (ELECTRONIC RESOURCES)

Text of Note
Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.

ACQUISITION INFORMATION NOTE

Source for Acquisition/Subscription Address
Safari Books Online
Stock Number
CL0500000021

OTHER EDITION IN ANOTHER MEDIUM

Title
Practical guide to trusted computing.

TOPICAL NAME USED AS SUBJECT

Computer security.
Embedded computer systems.
Programmable controllers.
Computer Science.
Computer security.
Computer security.
Computersicherheit
Electrical & Computer Engineering.
Electrical Engineering.
Embedded computer systems.
Embedded computer systems.
Engineering & Applied Sciences.
Freeware
Programmable controllers.
Programmable controllers.
Trusted Computing

DEWEY DECIMAL CLASSIFICATION

Number
005
.
8
Edition
22

LIBRARY OF CONGRESS CLASSIFICATION

Class number
TK7895
.
E42
Book number
P73
2008

OTHER CLASS NUMBERS

Class number
DAT
460f
System Code
stub

PERSONAL NAME - ALTERNATIVE RESPONSIBILITY

Challener, David.

ORIGINATING SOURCE

Date of Transaction
20201207205400.0
Cataloguing Rules (Descriptive Conventions))
pn

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival