Beschreibung
The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.
Autorenporträt
Dengguo Feng, Institute of Software, Chinese Academy of Sciences, Beijing, China
Herstellerkennzeichnung:
Walter de Gruyter GmbH
De Gruyter GmbH
Genthiner Strasse 13
10785 Berlin
DE
E-Mail: productsafety@degruyterbrill.com




































































































