The Resource A practical guide to trusted computing, David Challener [and others]
A practical guide to trusted computing, David Challener [and others]
Resource Information
The item A practical guide to trusted computing, David Challener [and others] represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.This item is available to borrow from 2 library branches.
Resource Information
The item A practical guide to trusted computing, David Challener [and others] represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.
This item is available to borrow from 2 library branches.
- Language
- eng
- Extent
- 1 online resource (xxviii, 347 pages)
- Contents
-
- pt. I. Background Material
- Ch. 1. Introduction to Trusted Computing
- Ch. 2. Design Goals of the Trusted Platform Module
- Ch. 3. An Overview of the Trusted Platform Module Capabilities
- pt. II. Programming Interfaces to TCG
- Ch. 4. Writing a TPM Device Driver
- Ch. 5. Low-Level Software: Using BIOS and TDDL Directly
- Ch. 6. Trusted Boot
- Ch. 7. The TCG Software Stack
- Ch. 8. Using TPM Keys
- Ch. 9. Using Symmetric Keys
- Ch. 10. The TSS Core Service (TCS)
- Ch. 11. Public Key Cryptography Standard #11
- pt. III. Architectures
- Ch. 12. Trusted Computing and Secure Storage
- Ch. 13. Trusted Computing and Secure Identification
- Ch. 14. Administration of Trusted Devices
- Ch. 15. Ancillary Hardware
- Ch. 16. Moving from TSS 1.1 to TSS 1.2
- pt. IV. Appendixes
- App. A. TPM Command Reference
- App. B. TSS Command Reference
- App. C. Function Library
- App. D. TSS Functions Grouped by Object and API Level
- Isbn
- 9780132398428
- Label
- A practical guide to trusted computing
- Title
- A practical guide to trusted computing
- Statement of responsibility
- David Challener [and others]
- Subject
-
- Trusted Computing
- Computer Science
- Computer security
- Computer security
- Computer security
- Computersicherheit
- Electrical & Computer Engineering
- Electrical Engineering
- Electronic book
- Embedded computer systems
- Embedded computer systems
- Embedded computer systems
- Engineering & Applied Sciences
- Freeware
- Programmable controllers
- Programmable controllers
- Programmable controllers
- Language
- eng
- Action
- digitized
- Cataloging source
- UMI
- Dewey number
- 005.8
- Illustrations
- illustrations
- Index
- index present
- Language note
- English
- LC call number
- TK7895.E42
- LC item number
- P73 2008
- Literary form
- non fiction
- Nature of contents
-
- dictionaries
- bibliography
- http://library.link/vocab/relatedWorkOrContributorName
- Challener, David
- http://library.link/vocab/subjectName
-
- Embedded computer systems
- Programmable controllers
- Computer security
- Embedded computer systems
- Programmable controllers
- Computer security
- Computer security
- Embedded computer systems
- Programmable controllers
- Trusted Computing
- Freeware
- Computersicherheit
- Engineering & Applied Sciences
- Electrical & Computer Engineering
- Electrical Engineering
- Computer Science
- Label
- A practical guide to trusted computing, David Challener [and others]
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- pt. I. Background Material -- Ch. 1. Introduction to Trusted Computing -- Ch. 2. Design Goals of the Trusted Platform Module -- Ch. 3. An Overview of the Trusted Platform Module Capabilities -- pt. II. Programming Interfaces to TCG -- Ch. 4. Writing a TPM Device Driver -- Ch. 5. Low-Level Software: Using BIOS and TDDL Directly -- Ch. 6. Trusted Boot -- Ch. 7. The TCG Software Stack -- Ch. 8. Using TPM Keys -- Ch. 9. Using Symmetric Keys -- Ch. 10. The TSS Core Service (TCS) -- Ch. 11. Public Key Cryptography Standard #11 -- pt. III. Architectures -- Ch. 12. Trusted Computing and Secure Storage -- Ch. 13. Trusted Computing and Secure Identification -- Ch. 14. Administration of Trusted Devices -- Ch. 15. Ancillary Hardware -- Ch. 16. Moving from TSS 1.1 to TSS 1.2 -- pt. IV. Appendixes -- App. A. TPM Command Reference -- App. B. TSS Command Reference -- App. C. Function Library -- App. D. TSS Functions Grouped by Object and API Level
- Control code
- 226860503
- Dimensions
- unknown
- Extent
- 1 online resource (xxviii, 347 pages)
- Form of item
- online
- Isbn
- 9780132398428
- Lccn
- 2007038929
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other physical details
- illustrations
- http://library.link/vocab/ext/overdrive/overdriveId
- cl0500000021
- Reproduction note
- Electronic reproduction.
- Sound
- unknown sound
- Specific material designation
- remote
- System control number
- (OCoLC)226860503
- System details
- Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
- Label
- A practical guide to trusted computing, David Challener [and others]
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- pt. I. Background Material -- Ch. 1. Introduction to Trusted Computing -- Ch. 2. Design Goals of the Trusted Platform Module -- Ch. 3. An Overview of the Trusted Platform Module Capabilities -- pt. II. Programming Interfaces to TCG -- Ch. 4. Writing a TPM Device Driver -- Ch. 5. Low-Level Software: Using BIOS and TDDL Directly -- Ch. 6. Trusted Boot -- Ch. 7. The TCG Software Stack -- Ch. 8. Using TPM Keys -- Ch. 9. Using Symmetric Keys -- Ch. 10. The TSS Core Service (TCS) -- Ch. 11. Public Key Cryptography Standard #11 -- pt. III. Architectures -- Ch. 12. Trusted Computing and Secure Storage -- Ch. 13. Trusted Computing and Secure Identification -- Ch. 14. Administration of Trusted Devices -- Ch. 15. Ancillary Hardware -- Ch. 16. Moving from TSS 1.1 to TSS 1.2 -- pt. IV. Appendixes -- App. A. TPM Command Reference -- App. B. TSS Command Reference -- App. C. Function Library -- App. D. TSS Functions Grouped by Object and API Level
- Control code
- 226860503
- Dimensions
- unknown
- Extent
- 1 online resource (xxviii, 347 pages)
- Form of item
- online
- Isbn
- 9780132398428
- Lccn
- 2007038929
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other physical details
- illustrations
- http://library.link/vocab/ext/overdrive/overdriveId
- cl0500000021
- Reproduction note
- Electronic reproduction.
- Sound
- unknown sound
- Specific material designation
- remote
- System control number
- (OCoLC)226860503
- System details
- Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
Subject
- Trusted Computing
- Computer Science
- Computer security
- Computer security
- Computer security
- Computersicherheit
- Electrical & Computer Engineering
- Electrical Engineering
- Electronic book
- Embedded computer systems
- Embedded computer systems
- Embedded computer systems
- Engineering & Applied Sciences
- Freeware
- Programmable controllers
- Programmable controllers
- Programmable controllers
Genre
Member of
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/A-practical-guide-to-trusted-computing-David/0fbK93IhpW8/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/A-practical-guide-to-trusted-computing-David/0fbK93IhpW8/">A practical guide to trusted computing, David Challener [and others]</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item A practical guide to trusted computing, David Challener [and others]
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/A-practical-guide-to-trusted-computing-David/0fbK93IhpW8/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/A-practical-guide-to-trusted-computing-David/0fbK93IhpW8/">A practical guide to trusted computing, David Challener [and others]</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>