{
"item_title" : "Trusted Computing",
"item_author" : [" Dengguo Feng", "Tsinghua University Press "],
"item_description" : "The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers. ",
"item_img_path" : "https://covers1.booksamillion.com/covers/bam/3/11/047/604/3110476045_b.jpg",
"price_data" : {
"retail_price" : "160.99", "online_price" : "160.99", "our_price" : "160.99", "club_price" : "160.99", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : ""
}
}
Trusted Computing : Principles and Applications
Overview
The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.
This item is Non-Returnable
Customers Also Bought
Details
- ISBN-13: 9783110476040
- ISBN-10: 3110476045
- Publisher: de Gruyter
- Publish Date: December 2017
- Dimensions: 9.6 x 6.9 x 0.9 inches
- Shipping Weight: 1.6 pounds
- Page Count: 311
Related Categories
