- Paperback: 293 pages
- Publisher: Intel Press (2006)
- Language: English
- ISBN-10: 0976483262
- ISBN-13: 978-0976483267
- Package Dimensions: 9.3 x 7.4 x 0.9 inches
- Shipping Weight: 1.5 pounds
- Average Customer Review: 1 customer review
- Amazon Best Sellers Rank: #3,932,337 in Books (See Top 100 in Books)
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Intel Safer Computing Initiative Building Blocks for Trusted Computing Paperback – Import, 2006
|New from||Used from|
|Paperback, Import, 2006||
This month's Book With Buzz: "The Lying Game" by Ruth Ware
From the instant New York Times bestselling author of blockbuster thrillers "In a Dark, Dark Wood" and "The Woman in Cabin 10" comes Ruth Ware’s chilling new novel, "The Lying Game." See more
Building Blocks for Trusted Computing With the ever-increasing connectivity of home and business computers, it is essential that developers understand how the Intel Safer Computing Initiative can provide critical security building blocks to better protect the PC computing environment. Security capabilities need to be carefully evaluated before delivery into the marketplace. Intel is committed to delivering security capabilities in a responsible manner for end users and the ecosystem. A highly versatile set of hardware-based security enhancements, code-named LaGrande Technology (LT), will be supported on Intel processors and chipsets to help enhance PC platforms. This book covers the fundamentals of LT and key Trusted Computing concepts such as security architecture, cryptography, trusted computer base, and trusted channels. Highlights include: History of trusted computing and definitions of key concepts, Comprehensive overview of protections that are provided by LaGrande Technology, * Case study showing how access to memory is the focal point of an attack Protection methods for execution, memory, storage, input, and graphics * How the Trusted Platform Module (TPM) supports attestation In this concise book, the lead security architect for Intel's next-generation security initiative provides critical information you need to evaluate Trusted Computing for use on today's PC systems and to prepare your designs to respond to future threats.
Browse award-winning titles. See more