A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM. The approach is to ramp the reader up quickly and keep their interest.A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security explains security concepts, describes the TPM 2.0 architecture, and provides code and pseudo-code examples in parallel, from very simple concepts and code to highly complex concepts and pseudo-code. The book includes instructions for the available execution environments and real code examples to get readers up and talking to the TPM quickly. The authors then help the users expand on that with pseudo-code descriptions of useful applications using the TPM. What you’ll learn TPM 2.0 architecture fundamentals, including changes from TPM 1.2 TPM 2.0 security concepts Essential application development techniques A deep dive into the features of TPM 2.0 A primer on the execution environments available for application development. Learn as you go! Who this book is for Application software developers, OS developers, device-driver developers, and embedded-device specialists, who will benefit from mastering TPM 2.0 capabilities and building their own applications quickly. This book will give them the tools they need to experiment with and understand the technology. Software architects who need to understand the security guarantees provided by TPMs Managers who fund the projects that use TPMs. Non-technical users who may want to know why TPMs are on their computers and how to make use of them. Table of Contents Chapter 1: History of the TPM Chapter 2: Basic Security Concepts Chapter 3: Quick Tutorial on TPM 2.0 Chapter 4: Existing Applications That Use TPMs Chapter 5: Navigating the Specification Chapter 6: Execution Environment Chapter 7: TPM Software Stack Chapter 8: TPM Entities Chapter 9: Hierarchies Chapter 10: Keys Chapter 11: NV Indexes Chapter 12: Platform Configuration Registers Chapter 13: Authorizations and Sessions Chapter 14: Extended Authorization (EA) Policies Chapter 15: Key Management Chapter 16: Auditing TPM Commands Chapter 17: Decrypt/Encrypt Sessions Chapter 18: Context Management Chapter 19: Startup, Shutdown, and Provisioning Chapter 20: Debugging Chapter 21: Solving Bigger Problems with the TPM 2.0 Chapter 22: Platform Security Technologies That Use TPM 2.0





























- qq_352524375l2015-12-18赞~感谢 好用~
- bingpishuai2015-04-29epub格式怎么打开啊
- barboonddd2015-06-05很不错的资源,TCG主页推荐的书籍,难得介绍TPM2.0,epub格式不像PDF方便但在PC端也是有不错的阅读软件的。推荐!
- baidu_242029792015-06-18可信计算越来越重要了

- 粉丝: 354
我的内容管理 展开
我的资源 快来上传第一个资源
我的收益
登录查看自己的收益我的积分 登录查看自己的积分
我的C币 登录后查看C币余额
我的收藏
我的下载
下载帮助


最新资源
- 科技管理系统如何借助AI+数智应用突破传统,实现高效管理与创新服务?.docx
- 科技管理系统如何通过AI+数智应用实现深层次的价值创造?.docx
- 面对AI+数智应用和大数据等新技术,科技管理系统如何实现智能化升级?.docx
- 面对复杂的科技管理工作,如何借助AI+数智应用构建个性化且高效的服务体系?.docx
- 面对科技管理系统升级的挑战,有哪些AI+数智应用解决方案能够助力企业突破瓶颈?.docx
- 如何借助AI+数智应用解决科技管理系统中存在的自主驱动不足与价值创造受限问题?.docx
- 如何借助AI+数智应用技术提升科研项目管理水平?.docx
- 如何借助AI+数智应用科技管理解决方案实现深层次价值创造?.docx
- 如何借助AI+数智应用实现技术转移服务的降本增效?.docx
- 如何借助AI+数智应用提高技术转移服务效率?.docx
- 如何借助AI+数智应用突破传统科技管理系统的局限,实现高效管理与价值创造?.docx
- 如何借助AI+数智应用突破传统科技管理系统局限,实现管理与服务融合及价值创造?.docx
- 如何利用AI+数智应用和大数据分析技术优化科技管理服务流程?.docx
- 如何利用AI+数智应用分析不同技术转移服务类别,以应对多维挑战?.docx
- 如何利用AI+数智应用技术解决技术转移服务成本高昂的问题?.docx
- 如何利用AI+数智应用技术提升科技管理系统的智能化水平?.docx


