By Kent Yoder
Use relied on Computing to Make desktops more secure, safer, and extra trustworthy
Every yr, computing device safety threats develop into extra critical. software program on my own can now not thoroughly shield opposed to them: what’s wanted is safe undefined. The relied on Platform Module (TPM) makes that attainable through supplying an entire, open regular for enforcing depended on computing subsystems in computers. Already to be had from almost each top notebook producer, TPM offers software program execs strong new how one can guard their consumers. Now, there’s a start-to-finish advisor for each software program specialist and protection expert who desires to make the most of this leap forward safeguard expertise.
Authored through innovators who helped create TPM and enforce its modern items, this functional e-book covers all points of TPM know-how: what it may well in attaining, the way it works, and the way to jot down functions for it. The authors supply deep, real-world insights into either TPM and the relied on Computing team (TCG) software program Stack. Then, to illustrate how TPM can remedy a lot of today’s such a lot not easy protection difficulties, they current 4 start-to-finish case stories, every one with wide C-based code examples.
- What providers and functions are supplied by way of TPMs
- TPM gadget drivers: options for code working in BIOS, TSS stacks for brand new working platforms, and memory-constrained environments
- Using TPM to reinforce the safety of a PC’s boot sequence
- Key administration, intensive: key production, garage, loading, migration, use, symmetric keys, and masses extra
- Linking PKCS#11 and TSS stacks to help purposes with middleware services
- What you must find out about TPM and privacy--including tips to stay away from privateness problems
- Moving from TSS 1.1 to the recent TSS 1.2 standard
- TPM and TSS command references and a whole functionality library
Read Online or Download A Practical Guide to Trusted Computing PDF
Best Network Security books
The newest concepts for avoiding UC disaster“This e-book is a must-read for any safeguard expert liable for VoIP or UC infrastructure. This new version is a robust source to help you hold your communications structures safe. ” ―Dan York, manufacturer and Co-Host, Blue field: The VoIP defense Podcast “The unique variation, Hacking uncovered: Voice over IP secrets and techniques & ideas, supplied a priceless source for defense execs.
At a time whilst on-line surveillance and cybercrime concepts are frequent, and are getting used through governments, organisations, and participants, Cyber Reconnaissance, Surveillance and security can provide a pragmatic source that explains how those actions are being conducted and indicates tips on how to guard opposed to them.
Cloud garage defense: a realistic advisor introduces and discusses the dangers linked to cloud-based facts garage from a safety and privateness point of view. achieve an in-depth knowing of the dangers and merits of cloud garage illustrated utilizing a Use-Case technique. The authors additionally offer a record that permits the person, in addition to the firm practitioner to guage what protection and privateness concerns have to be thought of whilst utilizing the cloud to shop own and delicate info.
In Securing VoIP Networks, prime specialists systematically evaluation the protection dangers and vulnerabilities linked to VoIP networks and provide confirmed, precise suggestions for securing them. Drawing on case reports from their very own fieldwork, the authors handle VoIP defense from the viewpoint of real-world community implementers, managers, and safeguard experts.
Additional resources for A Practical Guide to Trusted Computing