Intel® trusted execution technology for server platforms: a guide to more secure datacenters
This book guides the server administrator / datacenter manager in enabling the technology as well as establishing a launch control policy that he can use to customize the server's boot process to fit the datacenter's requirements. This book explains how the OS (typically a Virtual Machine...
Gespeichert in:
Beteiligte Personen: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Berkeley, CA
ApressOpen
2013
|
Schriftenreihe: | The expert's voice in security
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781430261483/?ar |
Zusammenfassung: | This book guides the server administrator / datacenter manager in enabling the technology as well as establishing a launch control policy that he can use to customize the server's boot process to fit the datacenter's requirements. This book explains how the OS (typically a Virtual Machine Monitor or Hypervisor) and supporting software can build on the secure facilities afforded by Intel TXT to provide additional security features and functions. It provides examples how the datacenter can create and use trusted pools. |
Beschreibung: | Online resource; title from PDF title page (SpringerLink, viewed October 14, 2013) |
Umfang: | 1 Online-Ressource (xx, 133 Seiten) |
ISBN: | 9781430261490 1430261498 143026148X 9781430261483 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047575875 | ||
003 | DE-627-1 | ||
005 | 20240228115403.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2013 xx |||||o 00| ||eng c | ||
020 | |a 9781430261490 |c electronic bk. |9 978-1-4302-6149-0 | ||
020 | |a 1430261498 |c electronic bk. |9 1-4302-6149-8 | ||
020 | |a 143026148X |9 1-4302-6148-X | ||
020 | |a 9781430261483 |9 978-1-4302-6148-3 | ||
020 | |a 9781430261483 |9 978-1-4302-6148-3 | ||
035 | |a (DE-627-1)047575875 | ||
035 | |a (DE-599)KEP047575875 | ||
035 | |a (ORHE)9781430261483 | ||
035 | |a (DE-627-1)047575875 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a URY |2 bicssc | |
072 | 7 | |a COM053000 |2 bisacsh | |
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Futral, William T. |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Intel® trusted execution technology for server platforms |b a guide to more secure datacenters |c William Futral, James Greene |
264 | 1 | |a Berkeley, CA |b ApressOpen |c 2013 | |
264 | 4 | |c ©2014 | |
300 | |a 1 Online-Ressource (xx, 133 Seiten) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a The expert's voice in security | |
500 | |a Online resource; title from PDF title page (SpringerLink, viewed October 14, 2013) | ||
520 | |a This book guides the server administrator / datacenter manager in enabling the technology as well as establishing a launch control policy that he can use to customize the server's boot process to fit the datacenter's requirements. This book explains how the OS (typically a Virtual Machine Monitor or Hypervisor) and supporting software can build on the secure facilities afforded by Intel TXT to provide additional security features and functions. It provides examples how the datacenter can create and use trusted pools. | ||
546 | |a English. | ||
650 | 0 | |a Client/server computing |x Security measures | |
650 | 0 | |a Database security | |
650 | 0 | |a Data encryption (Computer science) | |
650 | 4 | |a Architecture client-serveur (Informatique) ; Sécurité ; Mesures | |
650 | 4 | |a Bases de données ; Sécurité ; Mesures | |
650 | 4 | |a Chiffrement (Informatique) | |
650 | 4 | |a Computer science | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Database security | |
650 | 4 | |a Computer science | |
700 | 1 | |a Greene, James |e VerfasserIn |4 aut | |
776 | 1 | |z 9781430261490 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781430261490 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781430261483/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047575875 |
---|---|
_version_ | 1821494878932041728 |
adam_text | |
any_adam_object | |
author | Futral, William T. Greene, James |
author_facet | Futral, William T. Greene, James |
author_role | aut aut |
author_sort | Futral, William T. |
author_variant | w t f wt wtf j g jg |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047575875 (DE-599)KEP047575875 (ORHE)9781430261483 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02705cam a22006012 4500</leader><controlfield tag="001">ZDB-30-ORH-047575875</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115403.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2013 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781430261490</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4302-6149-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1430261498</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4302-6149-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">143026148X</subfield><subfield code="9">1-4302-6148-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781430261483</subfield><subfield code="9">978-1-4302-6148-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781430261483</subfield><subfield code="9">978-1-4302-6148-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047575875</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047575875</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781430261483</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047575875</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">URY</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Futral, William T.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Intel® trusted execution technology for server platforms</subfield><subfield code="b">a guide to more secure datacenters</subfield><subfield code="c">William Futral, James Greene</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berkeley, CA</subfield><subfield code="b">ApressOpen</subfield><subfield code="c">2013</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xx, 133 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">The expert's voice in security</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from PDF title page (SpringerLink, viewed October 14, 2013)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book guides the server administrator / datacenter manager in enabling the technology as well as establishing a launch control policy that he can use to customize the server's boot process to fit the datacenter's requirements. This book explains how the OS (typically a Virtual Machine Monitor or Hypervisor) and supporting software can build on the secure facilities afforded by Intel TXT to provide additional security features and functions. It provides examples how the datacenter can create and use trusted pools.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Client/server computing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Database security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Architecture client-serveur (Informatique) ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Bases de données ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Chiffrement (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Database security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Greene, James</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781430261490</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781430261490</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781430261483/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047575875 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:21:23Z |
institution | BVB |
isbn | 9781430261490 1430261498 143026148X 9781430261483 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xx, 133 Seiten) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | ApressOpen |
record_format | marc |
series2 | The expert's voice in security |
spelling | Futral, William T. VerfasserIn aut Intel® trusted execution technology for server platforms a guide to more secure datacenters William Futral, James Greene Berkeley, CA ApressOpen 2013 ©2014 1 Online-Ressource (xx, 133 Seiten) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier The expert's voice in security Online resource; title from PDF title page (SpringerLink, viewed October 14, 2013) This book guides the server administrator / datacenter manager in enabling the technology as well as establishing a launch control policy that he can use to customize the server's boot process to fit the datacenter's requirements. This book explains how the OS (typically a Virtual Machine Monitor or Hypervisor) and supporting software can build on the secure facilities afforded by Intel TXT to provide additional security features and functions. It provides examples how the datacenter can create and use trusted pools. English. Client/server computing Security measures Database security Data encryption (Computer science) Architecture client-serveur (Informatique) ; Sécurité ; Mesures Bases de données ; Sécurité ; Mesures Chiffrement (Informatique) Computer science Greene, James VerfasserIn aut 9781430261490 Erscheint auch als Druck-Ausgabe 9781430261490 |
spellingShingle | Futral, William T. Greene, James Intel® trusted execution technology for server platforms a guide to more secure datacenters Client/server computing Security measures Database security Data encryption (Computer science) Architecture client-serveur (Informatique) ; Sécurité ; Mesures Bases de données ; Sécurité ; Mesures Chiffrement (Informatique) Computer science |
title | Intel® trusted execution technology for server platforms a guide to more secure datacenters |
title_auth | Intel® trusted execution technology for server platforms a guide to more secure datacenters |
title_exact_search | Intel® trusted execution technology for server platforms a guide to more secure datacenters |
title_full | Intel® trusted execution technology for server platforms a guide to more secure datacenters William Futral, James Greene |
title_fullStr | Intel® trusted execution technology for server platforms a guide to more secure datacenters William Futral, James Greene |
title_full_unstemmed | Intel® trusted execution technology for server platforms a guide to more secure datacenters William Futral, James Greene |
title_short | Intel® trusted execution technology for server platforms |
title_sort | intel® trusted execution technology for server platforms a guide to more secure datacenters |
title_sub | a guide to more secure datacenters |
topic | Client/server computing Security measures Database security Data encryption (Computer science) Architecture client-serveur (Informatique) ; Sécurité ; Mesures Bases de données ; Sécurité ; Mesures Chiffrement (Informatique) Computer science |
topic_facet | Client/server computing Security measures Database security Data encryption (Computer science) Architecture client-serveur (Informatique) ; Sécurité ; Mesures Bases de données ; Sécurité ; Mesures Chiffrement (Informatique) Computer science |
work_keys_str_mv | AT futralwilliamt inteltrustedexecutiontechnologyforserverplatformsaguidetomoresecuredatacenters AT greenejames inteltrustedexecutiontechnologyforserverplatformsaguidetomoresecuredatacenters |