December 2007
Intermediate to advanced
384 pages
9h 30m
English
Chapter 1 Introduction to Trusted Computing
Computer Security Attacks Are Staggeringly Expensive
The Changing Threats to Computer Security
Malicious Programs: Viruses and Spyware/Adware
Social Engineering: Phishing and Pharming
Can Software Be Made Completely Secure?
Privacy and Recovery—Special Considerations for Hardware
Chapter 2 Design Goals of the Trusted Platform Module
Securely Reporting the Environment: Platform Status
Storing a Record of the Boot Sequence