Trusted Computing Platforms: TCPA Technology in Context
TCPA: Building computing platforms upon a solid foundation of trust. As businesses stake their very existence on the Internet, PCs, PDAs, and other key computing platforms, the trustworthiness of these platforms has become a vital concern. In response, the Trusted Computing Platform Alliance (TCPA)...
Gespeichert in:
Beteiligte Personen: | , , , , |
---|---|
Körperschaften: | , |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
[Place of publication not identified]
Pearson
2002
|
Ausgabe: | 1st edition. |
Schriftenreihe: | Hewlett-Packard professional books
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/0130092207/?ar |
Zusammenfassung: | TCPA: Building computing platforms upon a solid foundation of trust. As businesses stake their very existence on the Internet, PCs, PDAs, and other key computing platforms, the trustworthiness of these platforms has become a vital concern. In response, the Trusted Computing Platform Alliance (TCPA) has delivered a complete specification for building trusted computing platforms atop trusted hardware. In Trusted Computing Platforms , leaders of the initiative illuminate TCPA for every systems developer and decision-maker. They place TCPA in context, outlining its goals, techniques, and powerful implications for the future. What trusted computing platforms are, how they work, and what problems they will solve Transforming standard platforms into trusted platforms cost-effectively Scenarios for managers: TCPA applications in the security-focused business Protected storage: how TCPA can ensure the confidentiality of stored data Software integrity: ensuring that a system's software environment hasn't been tampered with Trust mechanisms in a trusted platform: functional descriptions, advantages, and overhead Trusted platforms in practice: TCPA for developers and technical professionals How trusted platforms can be used to protect user privacy The TCPA initiative: its history, status, and next steps forward Backed by an extraordinary range of industry leaders, TCPA offers the first complete, cost-effective, and globally applicable solution for trusted computing. Whether you develop new systems or apply them in business or government, you need to understand this technology-and with this book, you will. |
Beschreibung: | Online resource; Title from title page (viewed July 22, 2002) |
Umfang: | 1 Online-Ressource (352 Seiten). |
ISBN: | 9780130092205 0130092207 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047338288 | ||
003 | DE-627-1 | ||
005 | 20240228121219.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2002 xx |||||o 00| ||eng c | ||
020 | |a 9780130092205 |9 978-0-13-009220-5 | ||
020 | |a 0130092207 |9 0-13-009220-7 | ||
035 | |a (DE-627-1)047338288 | ||
035 | |a (DE-599)KEP047338288 | ||
035 | |a (ORHE)0130092207 | ||
035 | |a (DE-627-1)047338288 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 22/eng/20230216 | |
100 | 1 | |a Pearson, Siani |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Trusted Computing Platforms |b TCPA Technology in Context |c Pearson, Siani |
250 | |a 1st edition. | ||
264 | 1 | |a [Place of publication not identified] |b Pearson |c 2002 | |
300 | |a 1 Online-Ressource (352 Seiten). | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a Hewlett-Packard professional books | |
500 | |a Online resource; Title from title page (viewed July 22, 2002) | ||
520 | |a TCPA: Building computing platforms upon a solid foundation of trust. As businesses stake their very existence on the Internet, PCs, PDAs, and other key computing platforms, the trustworthiness of these platforms has become a vital concern. In response, the Trusted Computing Platform Alliance (TCPA) has delivered a complete specification for building trusted computing platforms atop trusted hardware. In Trusted Computing Platforms , leaders of the initiative illuminate TCPA for every systems developer and decision-maker. They place TCPA in context, outlining its goals, techniques, and powerful implications for the future. What trusted computing platforms are, how they work, and what problems they will solve Transforming standard platforms into trusted platforms cost-effectively Scenarios for managers: TCPA applications in the security-focused business Protected storage: how TCPA can ensure the confidentiality of stored data Software integrity: ensuring that a system's software environment hasn't been tampered with Trust mechanisms in a trusted platform: functional descriptions, advantages, and overhead Trusted platforms in practice: TCPA for developers and technical professionals How trusted platforms can be used to protect user privacy The TCPA initiative: its history, status, and next steps forward Backed by an extraordinary range of industry leaders, TCPA offers the first complete, cost-effective, and globally applicable solution for trusted computing. Whether you develop new systems or apply them in business or government, you need to understand this technology-and with this book, you will. | ||
650 | 0 | |a Computer security |x Standards | |
650 | 0 | |a Electronic information resources |x Access control | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 4 | |a Sécurité informatique ; Normes | |
650 | 4 | |a Sources d'information électroniques ; Accès ; Contrôle | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security ; Standards | |
650 | 4 | |a Electronic information resources ; Access control | |
700 | 1 | |a Balacheff, Boris |e VerfasserIn |4 aut | |
700 | 1 | |a Chen, Liqun |e VerfasserIn |4 aut | |
700 | 1 | |a Plaquin, David |e VerfasserIn |4 aut | |
700 | 1 | |a Proudler, Graeme |e VerfasserIn |4 aut | |
710 | 2 | |a O'Reilly for Higher Education (Firm), |e MitwirkendeR |4 ctb | |
710 | 2 | |a Safari, an O'Reilly Media Company. |e MitwirkendeR |4 ctb | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/0130092207/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047338288 |
---|---|
_version_ | 1821494921729671168 |
adam_text | |
any_adam_object | |
author | Pearson, Siani Balacheff, Boris Chen, Liqun Plaquin, David Proudler, Graeme |
author_corporate | O'Reilly for Higher Education (Firm) Safari, an O'Reilly Media Company |
author_corporate_role | ctb ctb |
author_facet | Pearson, Siani Balacheff, Boris Chen, Liqun Plaquin, David Proudler, Graeme O'Reilly for Higher Education (Firm) Safari, an O'Reilly Media Company |
author_role | aut aut aut aut aut |
author_sort | Pearson, Siani |
author_variant | s p sp b b bb l c lc d p dp g p gp |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047338288 (DE-599)KEP047338288 (ORHE)0130092207 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 1st edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03739cam a22005532 4500</leader><controlfield tag="001">ZDB-30-ORH-047338288</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121219.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2002 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780130092205</subfield><subfield code="9">978-0-13-009220-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0130092207</subfield><subfield code="9">0-13-009220-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047338288</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047338288</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)0130092207</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047338288</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/eng/20230216</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Pearson, Siani</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Trusted Computing Platforms</subfield><subfield code="b">TCPA Technology in Context</subfield><subfield code="c">Pearson, Siani</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">Pearson</subfield><subfield code="c">2002</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (352 Seiten).</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Hewlett-Packard professional books</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; Title from title page (viewed July 22, 2002)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">TCPA: Building computing platforms upon a solid foundation of trust. As businesses stake their very existence on the Internet, PCs, PDAs, and other key computing platforms, the trustworthiness of these platforms has become a vital concern. In response, the Trusted Computing Platform Alliance (TCPA) has delivered a complete specification for building trusted computing platforms atop trusted hardware. In Trusted Computing Platforms , leaders of the initiative illuminate TCPA for every systems developer and decision-maker. They place TCPA in context, outlining its goals, techniques, and powerful implications for the future. What trusted computing platforms are, how they work, and what problems they will solve Transforming standard platforms into trusted platforms cost-effectively Scenarios for managers: TCPA applications in the security-focused business Protected storage: how TCPA can ensure the confidentiality of stored data Software integrity: ensuring that a system's software environment hasn't been tampered with Trust mechanisms in a trusted platform: functional descriptions, advantages, and overhead Trusted platforms in practice: TCPA for developers and technical professionals How trusted platforms can be used to protect user privacy The TCPA initiative: its history, status, and next steps forward Backed by an extraordinary range of industry leaders, TCPA offers the first complete, cost-effective, and globally applicable solution for trusted computing. Whether you develop new systems or apply them in business or government, you need to understand this technology-and with this book, you will.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Standards</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic information resources</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique ; Normes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sources d'information électroniques ; Accès ; Contrôle</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security ; Standards</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic information resources ; Access control</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Balacheff, Boris</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chen, Liqun</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Plaquin, David</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Proudler, Graeme</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">O'Reilly for Higher Education (Firm),</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Safari, an O'Reilly Media Company.</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/0130092207/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047338288 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:22:04Z |
institution | BVB |
isbn | 9780130092205 0130092207 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (352 Seiten). |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2002 |
publishDateSearch | 2002 |
publishDateSort | 2002 |
publisher | Pearson |
record_format | marc |
series2 | Hewlett-Packard professional books |
spelling | Pearson, Siani VerfasserIn aut Trusted Computing Platforms TCPA Technology in Context Pearson, Siani 1st edition. [Place of publication not identified] Pearson 2002 1 Online-Ressource (352 Seiten). Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Hewlett-Packard professional books Online resource; Title from title page (viewed July 22, 2002) TCPA: Building computing platforms upon a solid foundation of trust. As businesses stake their very existence on the Internet, PCs, PDAs, and other key computing platforms, the trustworthiness of these platforms has become a vital concern. In response, the Trusted Computing Platform Alliance (TCPA) has delivered a complete specification for building trusted computing platforms atop trusted hardware. In Trusted Computing Platforms , leaders of the initiative illuminate TCPA for every systems developer and decision-maker. They place TCPA in context, outlining its goals, techniques, and powerful implications for the future. What trusted computing platforms are, how they work, and what problems they will solve Transforming standard platforms into trusted platforms cost-effectively Scenarios for managers: TCPA applications in the security-focused business Protected storage: how TCPA can ensure the confidentiality of stored data Software integrity: ensuring that a system's software environment hasn't been tampered with Trust mechanisms in a trusted platform: functional descriptions, advantages, and overhead Trusted platforms in practice: TCPA for developers and technical professionals How trusted platforms can be used to protect user privacy The TCPA initiative: its history, status, and next steps forward Backed by an extraordinary range of industry leaders, TCPA offers the first complete, cost-effective, and globally applicable solution for trusted computing. Whether you develop new systems or apply them in business or government, you need to understand this technology-and with this book, you will. Computer security Standards Electronic information resources Access control Computer networks Security measures Sécurité informatique ; Normes Sources d'information électroniques ; Accès ; Contrôle Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures Computer security ; Standards Electronic information resources ; Access control Balacheff, Boris VerfasserIn aut Chen, Liqun VerfasserIn aut Plaquin, David VerfasserIn aut Proudler, Graeme VerfasserIn aut O'Reilly for Higher Education (Firm), MitwirkendeR ctb Safari, an O'Reilly Media Company. MitwirkendeR ctb |
spellingShingle | Pearson, Siani Balacheff, Boris Chen, Liqun Plaquin, David Proudler, Graeme Trusted Computing Platforms TCPA Technology in Context Computer security Standards Electronic information resources Access control Computer networks Security measures Sécurité informatique ; Normes Sources d'information électroniques ; Accès ; Contrôle Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures Computer security ; Standards Electronic information resources ; Access control |
title | Trusted Computing Platforms TCPA Technology in Context |
title_auth | Trusted Computing Platforms TCPA Technology in Context |
title_exact_search | Trusted Computing Platforms TCPA Technology in Context |
title_full | Trusted Computing Platforms TCPA Technology in Context Pearson, Siani |
title_fullStr | Trusted Computing Platforms TCPA Technology in Context Pearson, Siani |
title_full_unstemmed | Trusted Computing Platforms TCPA Technology in Context Pearson, Siani |
title_short | Trusted Computing Platforms |
title_sort | trusted computing platforms tcpa technology in context |
title_sub | TCPA Technology in Context |
topic | Computer security Standards Electronic information resources Access control Computer networks Security measures Sécurité informatique ; Normes Sources d'information électroniques ; Accès ; Contrôle Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures Computer security ; Standards Electronic information resources ; Access control |
topic_facet | Computer security Standards Electronic information resources Access control Computer networks Security measures Sécurité informatique ; Normes Sources d'information électroniques ; Accès ; Contrôle Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures Computer security ; Standards Electronic information resources ; Access control |
work_keys_str_mv | AT pearsonsiani trustedcomputingplatformstcpatechnologyincontext AT balacheffboris trustedcomputingplatformstcpatechnologyincontext AT chenliqun trustedcomputingplatformstcpatechnologyincontext AT plaquindavid trustedcomputingplatformstcpatechnologyincontext AT proudlergraeme trustedcomputingplatformstcpatechnologyincontext AT oreillyforhighereducationfirm trustedcomputingplatformstcpatechnologyincontext AT safarianoreillymediacompany trustedcomputingplatformstcpatechnologyincontext |