Trusted platform modules : why, when and how to use them

Trusted Platform Modules (TPMs) are small, inexpensive chips which provide a limited set of security functions. They are most commonly found as a motherboard component on laptops and desktops aimed at the corporate or government markets, but can also be found on many consumer-grade machines and serv...

Full description

Saved in:
Bibliographic Details
Main Author Segall, Ariel (Author)
Format Electronic eBook
LanguageEnglish
Published London, United Kingdom : The Institution of Engineering and Technology, 2016.
SeriesProfessional applications of computing series ; 13.
Subjects
Online AccessFull text
ISBN9781849198943
1849198942
9781523108572
1523108576
1849198934
9781849198936
Physical Description1 online resource (xviii, 363 pages) : illustrations (black and white)

Cover

Table of Contents:
  • Acknowledgments; Glossary and acronym expansions; 1. Introduction; 2. When to use a TPM; 3. TPM concepts and functionality; 4. Programming introduction; 5. Provisioning: getting the TPM ready to use; 6. First steps: TPM keys; 7. Machine authentication; 8. Data protection; 9. Attestation; 10. Other TPM features; 11. Software, specifications, and more: Where to find other TPM resources; 12. Troubleshooting; 13. Conclusion and review; Appendix A. Basic cryptographic concepts; Appendix B. Command equivalence and requirements charts; Appendix C. Complete code samples; Copyright Notices.