No credit card required
About the Authors
Part I: Background Material
Chapter 1 Introduction to Trusted Computing
Computer Security Attacks Are Staggeringly Expensive
The Changing Threats to Computer Security
Malicious Programs: Viruses and Spyware/Adware
Social Engineering: Phishing and Pharming
Physical Theft of Data
Can Software Be Made Completely Secure?
How Can the TPM Help?
Privacy and Recovery—Special Considerations for Hardware
Chapter 2 Design Goals of the Trusted Platform Module
Securely Reporting the Environment: Platform Status
Storing a Record of the Boot Sequence
Reporting the Boot Sequence Record
Storing Data and Symmetric ...