O'Reilly logo

Windows® 7 Administrator’s Pocket Consultant by William R. Stanek

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 11. Using TPM and BitLocker Drive Encryption

  • Creating Trusted Platforms 380

  • BitLocker Drive Encryption: The Essentials 387

  • Managing BitLocker Drive Encryption 393

Many of the security features built into the Windows 7 operating system are designed to protect a computer from attacks by individuals accessing the computer over a network or from the Internet. But what about when individuals have direct physical access to a computer or your data? In these instances, Windows security safeguards don't apply. If someone can boot a computer—even if it is to another operating system he's installed—he could gain access to any data stored on the computer, perhaps even your organization's most sensitive data. In addition, with the increased use of USB ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required