Trusted platform modules : why, when and how to use them
Trusted Platform Modules (TPMs) are small, inexpensive chips which provide a limited set of security functions. They are most commonly found as a motherboard component on laptops and desktops aimed at the corporate or government markets, but can also be found on many consumer-grade machines and serv...
Saved in:
| Main Author | |
|---|---|
| Format | Electronic eBook |
| Language | English |
| Published |
London, United Kingdom :
The Institution of Engineering and Technology,
2016.
|
| Series | Professional applications of computing series ;
13. |
| Subjects | |
| Online Access | Full text |
| ISBN | 9781849198943 1849198942 9781523108572 1523108576 1849198934 9781849198936 |
| Physical Description | 1 online resource (xviii, 363 pages) : illustrations (black and white) |
Cover
Table of Contents:
- Acknowledgments; Glossary and acronym expansions; 1. Introduction; 2. When to use a TPM; 3. TPM concepts and functionality; 4. Programming introduction; 5. Provisioning: getting the TPM ready to use; 6. First steps: TPM keys; 7. Machine authentication; 8. Data protection; 9. Attestation; 10. Other TPM features; 11. Software, specifications, and more: Where to find other TPM resources; 12. Troubleshooting; 13. Conclusion and review; Appendix A. Basic cryptographic concepts; Appendix B. Command equivalence and requirements charts; Appendix C. Complete code samples; Copyright Notices.