Coverart for item
The Resource A practical guide to trusted computing, David Challener [and others]

A practical guide to trusted computing, David Challener [and others]

Label
A practical guide to trusted computing
Title
A practical guide to trusted computing
Statement of responsibility
David Challener [and others]
Contributor
Subject
Genre
Language
eng
Member of
Action
digitized
Cataloging source
UMI
Dewey number
005.8
Illustrations
illustrations
Index
index present
Language note
English
LC call number
TK7895.E42
LC item number
P73 2008
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
Challener, David
http://library.link/vocab/subjectName
  • Embedded computer systems
  • Programmable controllers
  • Computer security
  • Embedded computer systems
  • Programmable controllers
  • Computer security
  • Computer security
  • Embedded computer systems
  • Programmable controllers
  • Trusted Computing
  • Freeware
  • Computersicherheit
  • Engineering & Applied Sciences
  • Electrical & Computer Engineering
  • Electrical Engineering
  • Computer Science
Label
A practical guide to trusted computing, David Challener [and others]
Instantiates
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
pt. I. Background Material -- Ch. 1. Introduction to Trusted Computing -- Ch. 2. Design Goals of the Trusted Platform Module -- Ch. 3. An Overview of the Trusted Platform Module Capabilities -- pt. II. Programming Interfaces to TCG -- Ch. 4. Writing a TPM Device Driver -- Ch. 5. Low-Level Software: Using BIOS and TDDL Directly -- Ch. 6. Trusted Boot -- Ch. 7. The TCG Software Stack -- Ch. 8. Using TPM Keys -- Ch. 9. Using Symmetric Keys -- Ch. 10. The TSS Core Service (TCS) -- Ch. 11. Public Key Cryptography Standard #11 -- pt. III. Architectures -- Ch. 12. Trusted Computing and Secure Storage -- Ch. 13. Trusted Computing and Secure Identification -- Ch. 14. Administration of Trusted Devices -- Ch. 15. Ancillary Hardware -- Ch. 16. Moving from TSS 1.1 to TSS 1.2 -- pt. IV. Appendixes -- App. A. TPM Command Reference -- App. B. TSS Command Reference -- App. C. Function Library -- App. D. TSS Functions Grouped by Object and API Level
Control code
226860503
Dimensions
unknown
Extent
1 online resource (xxviii, 347 pages)
Form of item
online
Isbn
9780132398428
Lccn
2007038929
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other physical details
illustrations
http://library.link/vocab/ext/overdrive/overdriveId
cl0500000021
Reproduction note
Electronic reproduction.
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)226860503
System details
Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
Label
A practical guide to trusted computing, David Challener [and others]
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
pt. I. Background Material -- Ch. 1. Introduction to Trusted Computing -- Ch. 2. Design Goals of the Trusted Platform Module -- Ch. 3. An Overview of the Trusted Platform Module Capabilities -- pt. II. Programming Interfaces to TCG -- Ch. 4. Writing a TPM Device Driver -- Ch. 5. Low-Level Software: Using BIOS and TDDL Directly -- Ch. 6. Trusted Boot -- Ch. 7. The TCG Software Stack -- Ch. 8. Using TPM Keys -- Ch. 9. Using Symmetric Keys -- Ch. 10. The TSS Core Service (TCS) -- Ch. 11. Public Key Cryptography Standard #11 -- pt. III. Architectures -- Ch. 12. Trusted Computing and Secure Storage -- Ch. 13. Trusted Computing and Secure Identification -- Ch. 14. Administration of Trusted Devices -- Ch. 15. Ancillary Hardware -- Ch. 16. Moving from TSS 1.1 to TSS 1.2 -- pt. IV. Appendixes -- App. A. TPM Command Reference -- App. B. TSS Command Reference -- App. C. Function Library -- App. D. TSS Functions Grouped by Object and API Level
Control code
226860503
Dimensions
unknown
Extent
1 online resource (xxviii, 347 pages)
Form of item
online
Isbn
9780132398428
Lccn
2007038929
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other physical details
illustrations
http://library.link/vocab/ext/overdrive/overdriveId
cl0500000021
Reproduction note
Electronic reproduction.
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)226860503
System details
Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.

Library Locations

    • Ellis LibraryBorrow it
      1020 Lowry Street, Columbia, MO, 65201, US
      38.944491 -92.326012
    • Engineering Library & Technology CommonsBorrow it
      W2001 Lafferre Hall, Columbia, MO, 65211, US
      38.946102 -92.330125
Processing Feedback ...