Trusted Computing : Principles and Applications
Book Details
Delivery Location
Delivery fee: Select location
Delivery in 29 days
The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.
Get Trusted Computing by at the best price and quality guaranteed only at Werezi Africa's largest book ecommerce store. The book was published by De Gruyter and it has pages.