Trusted Platform Module Basics: Using TPM in Embedded Systems (Embedded Technology) PAP/CDR Edition

5 customer reviews
ISBN-13: 978-0750679602
ISBN-10: 0750679603
Why is ISBN important?
ISBN
This bar-code number lets you verify that you're getting exactly the right version or edition of a book. The 13-digit and 10-digit formats both work.
Scan an ISBN with your phone
Use the Amazon App to scan ISBNs and compare prices.
Have one to sell? Sell on Amazon
Buy new
$65.59
In Stock.
Ships from and sold by Amazon.com. Gift-wrap available.
List Price: $84.95 Save: $19.36 (23%)
21 New from $65.59
Qty:1
Trusted Platform Module B... has been added to your Cart
Rent from Amazon Price New from Used from
Kindle
"Please retry"
$16.76
Paperback, July 25, 2006
"Please retry"
$65.59
$65.59 $82.20
More Buying Choices
21 New from $65.59 11 Used from $82.20
Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student


InterDesign Brand Store Awareness Rent Textbooks
$65.59 FREE Shipping. In Stock. Ships from and sold by Amazon.com. Gift-wrap available.

Frequently Bought Together

Trusted Platform Module Basics: Using TPM in Embedded Systems (Embedded Technology) + A Practical Guide to Trusted Computing
Price for both: $104.09

Buy the selected items together

Editorial Reviews

From the Back Cover

Security has become a key design consideration for many embedded engineers due to the significant advances in embedded systems’ networking capabilities. However, system security is difficult to manage, and the typical size, power, and cost limitations faced by embedded developers inhibit their use of many software-based cryptographic security models.

The Trusted Computing Group’s (TCG) Trusted Platform Module (TPM) open standard, which facilitates hacker-safe computing at the hardware level, presents a possible solution to this quandary. Although PC designers don’t particularly need to see inside the TPM’s “black box,” embedded engineers must become intimately familiar with its functionality to enable security measure customization that conserves space, memory, and power.

In this practical guide, expert author Steven Kinney cuts through the complexities of the lengthy TPM specification to provide a targeted, solid foundation for understanding the standard.

This book encapsulates everything readers need to know in order to take advantage of hardware security based on sound TCG standards. It introduces the TPM interface’s basic concepts, then discusses command compilation and execution in detail, focusing on the TPM key hierarchy and the specification itself. The author presents a methodology that allows developers to successfully integrate the TPM into an embedded design and to verify the TPM’s operation on a specific platform. Detailed real-world application examples throughout the book use the popular Atmel single-chip implementation of the TPM, which was created specifically for use in embedded designs.

Device drivers and useful tools are included on the accompanying CD-ROM.
NO_CONTENT_IN_FEATURE

Best Books of the Month
Best Books of the Month
Want to know our Editors' picks for the best books of the month? Browse Best Books of the Month, featuring our favorite new books in more than a dozen categories.

Product Details

  • Series: Embedded Technology
  • Paperback: 368 pages
  • Publisher: Newnes; PAP/CDR edition (August 8, 2006)
  • Language: English
  • ISBN-10: 0750679603
  • ISBN-13: 978-0750679602
  • Product Dimensions: 7.5 x 0.8 x 9.2 inches
  • Shipping Weight: 1.8 pounds (View shipping rates and policies)
  • Average Customer Review: 2.0 out of 5 stars  See all reviews (5 customer reviews)
  • Amazon Best Sellers Rank: #2,986,827 in Books (See Top 100 in Books)

More About the Author

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

Most Helpful Customer Reviews

11 of 11 people found the following review helpful By Gunner D. Danneels on June 1, 2007
Format: Paperback
Wow, where to start? I guess with the introduction that contains errors of fact - RSA does not stand for random scheduling algorithm. This gets the book of to a really bad start and it just lurches along from there. This book is just full of details without any relevant context. The first chapter tells what calls to use to initialize the TPM for memory present and memory absent implementations, but doesn't define the difference between memory present and memory absent and why you would choose one over the other. Let alone not providing a context chapter and jumping right into providing call details. The writing style is the most confusing thing that I have ever run across, with irrelevant clauses included that just confuse the situation. I had to read it with a pen and cross out all of the irrelevant parts and then re-read the paragraph in order to understand it. It's a stream of conciousness technical book. As hard as the TCG specifications are to understand, this book doesn't make them any easier. I was hoping for a guided trip through the architecture to prepare me for tackling the specifications. I think the specifications are easier to read directly than this book.

I've been in the computer industry 20 years and never have I encountered such a poorly written work.
3 Comments Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
8 of 9 people found the following review helpful By Ed S. on February 3, 2007
Format: Paperback Verified Purchase
Wow. As an engineer, I've read some seriously bad writing, but rarely does a technical book plead so convincingly for review by a competent editor. The book is so littered with "with regards to," "relative to," "concerning," and "it is safe to say that," I'd swear it would shrink by half if only the author had the vaguest familiarity with the work of Professors Strunk and White. The passive voice has never found a more welcoming home. And you know you're in for a rough ride when you find the publisher's name misspelled on the very first page (it's "Newnes," not "Newness").

On top of that, the author insists on promoting his employer's products, and spends half a chapter ranting about "hackers" who levied "malicious attacks" on their Xboxes by installing Linux on them. Simply unprofessional.

As for content, the book promises early on to guide embedded systems developers in implementing TPM in their designs, but ends up devoting far more space to niggling protocol details than to suggestions on their use.

There's some good information buried somewhere in this book, but unless you have a babelfish handy, I'd recommend you hold your nose and read the freely-available TPM specifications rather than spending money on this volume.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
5 of 7 people found the following review helpful By Max May on July 5, 2009
Format: Paperback
I work for the company that makes the TPM's in the book, and the company that Steve used to work for. This book is simply wrong in many places. Steve blamed the editor for "correcting" the book. Go get the IBM press book or just read standards on the TCG site. We use the copies we have (we got a case of them) to level wobbly desks.
1 Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
2 of 3 people found the following review helpful By J. Johnson on January 15, 2010
Format: Paperback Verified Purchase
There is not a whole lot to complain about. This is the only book I found with no mention of having to use operating systems calls, which when working with embedded micro controllers is usually irrelevant. It gives a step by step detail low level walk through of each command which is helpful if your trying to wade through the spec. I got both the IBM press book and found it to be a good overview, but not much help when it comes to the low level interfacing and non-os work. There are some mistakes, but this is a pretty small niche area to develop on, I'm really surprised there are any book written on it at this level at all.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
1 of 2 people found the following review helpful By Daren on September 26, 2007
Format: Paperback Verified Purchase
The book may have some writing issues as Kinney writes in a very informal style. But engineers aren't known for their writing - they're known for building things. We are also known for being very critical.

Still, his book provides a basic background in trusted computing and the cryptography implemented using TPMs. It's main focus is explaining the various Trusted Platform Module (TPM) commands used within the TCG v1.1b spec. There is a chapter on some of the differences between v1.1b and v1.2. I would have liked to see some very basic c programs included to get a better feel of actually using the commands together. That would be my only real complaint.

The author does have some pride toward the product he helped develop. But from talk within the TCG community, he no longer works for Atmel, where he helped developed the TPM firmware. So he's not trying to sell anything he can profit from. I think he's just proud of his team's work.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Set up an Amazon Giveaway

Amazon Giveaway allows you to run promotional giveaways in order to create buzz, reward your audience, and attract new followers and customers. Learn more
Trusted Platform Module Basics: Using TPM in Embedded Systems (Embedded Technology)
This item: Trusted Platform Module Basics: Using TPM in Embedded Systems (Embedded Technology)
Price: $65.59
Ships from and sold by Amazon.com

What Other Items Do Customers Buy After Viewing This Item?

Want to discover more products? Check out these pages to see more: programming, electronic book, software development, embedded