Skip to Content
Trusted Computing
book

Trusted Computing

by Dengguo Feng, Tsinghua University Tsinghua University Press
December 2017
Intermediate to advanced content levelIntermediate to advanced
311 pages
10h 23m
English
De Gruyter

Overview

The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

A Practical Guide to Trusted Computing

A Practical Guide to Trusted Computing

David Challener, Kent Yoder, Ryan Catherman, David Safford, Leendert Van Doorn
Practical Network Scanning

Practical Network Scanning

Ajay Singh Chauhan
Security without Obscurity

Security without Obscurity

Jeff Stapleton, W. Clay Epstein

Publisher Resources

ISBN: 9783110476095