1Introduction
With rapid development of cloud computing, Internet of Things and mobile Internet, information technology has changed society management and public life profoundly, and ubiquitous information has already been treated as important digital assets of a nation, an enterprise or a person. Considering widespread computer virus, malicious software and enhanced hacker technique, these important assets are facing more and more practical threats. It is no doubt a preferential security requirement from nation, enterprise and person that a trustworthy computing environment should be built to maintain confidentiality, integrity, authenticity and reliability of information. Traditional security technologies like firewall, IDS and virus defense ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access