下载 >  安全技术 >  系统安全 > A Practical Guide to TPM 2.0 Using the Trusted Platform Module

A Practical Guide to TPM 2.0 Using the Trusted Platform Module 评分:

A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM. The approach is to ramp the reader up quickly and keep their interest.A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security explains security concepts, describes the TPM 2.0 architecture, and provides code and pseudo-code examples in parallel, from very simple concepts and code to highly complex concepts and pseudo-code. The book includes instructions for the available execution environments and real code examples to get readers up and talking to the TPM quickly. The authors then help the users expand on that with pseudo-code descriptions of useful applications using the TPM. What you’ll learn TPM 2.0 architecture fundamentals, including changes from TPM 1.2 TPM 2.0 security concepts Essential application development techniques A deep dive into the features of TPM 2.0 A primer on the execution environments available for application development. Learn as you go! Who this book is for Application software developers, OS developers, device-driver developers, and embedded-device specialists, who will benefit from mastering TPM 2.0 capabilities and building their own applications quickly. This book will give them the tools they need to experiment with and understand the technology. Software architects who need to understand the security guarantees provided by TPMs Managers who fund the projects that use TPMs. Non-technical users who may want to know why TPMs are on their computers and how to make use of them.
...展开详情收缩
2016-01-17 上传大小:5.34MB
想读
分享
收藏 (1) 举报

评论 共2条

zhangjin3505 挺好 并官方的specification要好懂一些 特别是密钥管理方面
2017-09-29
回复
qq_21041471 终于找到 一本介绍 TPM 2.0 的书了,谢谢分享
2016-06-22
回复
Winbond Trusted Platform Module 1.2 驱动安装解决办法详解
Trusted platform module basics - using TPM in embedded systems.pdf

Trusted platform module basics - using TPM in embedded systems.pdf

立即下载
Protection Profile PC Client Specific Trusted Platform Module TPM Family 1.2, Level 2

resource meterial able to be acquired freely. Protection Profile PC Client Specific Trusted Platform Module TPM Family 1.2, Level 2 Protection Profile PC Client Specific Trusted Platform Module TPM Family 1.2, Level 2

立即下载
Trusted Platform Module Evolution

描述了TPM的发展,简述了TPM背景与TPM架构 TPMs have been used in a wide variety of applications, but some issues have hampered large-scale adoption. During the last 8 years, the Trusted Computing Group has been working on revising the specification to increase its flexibility, manageability, and utility. This articl

立即下载
可信计算的经典论文 trusted computing

关于可信计算的一些论文 主要是trusted platform module 相关

立即下载
TrustedGRUB-1.1.5.tar.gz

TrustedGRUB extends the GRUB bootloader with TCG support. This makes it possible to provide a secure bootstrap architecture. The whole boot process is measured and - by support of a Trusted Platform Module (TPM) - the system integrity is verifyable

立即下载
IBM's Software Trusted Platform Module

IBM's Software Trusted Platform Module,是由IBM实现的模拟TPM的软件。可以用于TPM的研究。

立即下载
TPM 可信计算的一些文章

关于TPM(trust platform module) 可信计算的一些经典文章

立即下载
A Practical Guide to Trusted Computing

IBM出版的,可信计算指南,里面讲的比较具体,代码也比较详细,适合实践阅读

立即下载
A practical guide to building owl ontologies using protege

一本详细介绍如何基于OWL进行Ontology建模的好书,其中也包括了如何使用Protege等建模工具的说明和教程。

立即下载
TPM 2.0规范特点

TPM 2规范 目前,新的TPM规范即TPM 2.0尚在研究制定中,不原有的TPM1.2规范相比,其预期的主要特点

立即下载
Analysis of Clinical Trials Using SAS A Practical Guide

Analysis of Clinical Trials Using SAS A Practical Guide

立即下载
IBM SOA Architecture

简介了IBM的SOA的架构 SOA Development Using the IBM Rational Software Development Platform: A Practical Guide

立即下载
A Practical Guide to TPM 2.0

intel资深专家编写。 Chapter 1: History of the TPM Chapter 2: Basic Security Concepts Chapter 3: Quick Tutorial on TPM 2.0 Chapter 4: Existing Applications That Use TPMs Chapter 5: Navigating the Specification Chapter 6: Execution Environment Chapter 7: TPM Software Stack Chapter 8: TPM Entities Chapter 9:

立即下载
CE6 Student Manual - 02

Module 2: Tools for Platform Development

立即下载
TCG PC Client Specific TPM Interface Specification(TIS)

TCG PC Client Specific TPM Interface Specification(TIS)

立即下载
一些可信计算开源项目汇总

可信计算的研究主要以TCG组织为主,国内开展可信计算研究的思路基本也是跟着TCG的步伐。可信计算最核心的就是TPM硬件芯片,现在该规范已经升级到TPM 2.0,也称为“Trusted Platform Module Library Specification”,而且遵循该规范的新芯片也已经面世。 国内与TPM对应的是由国家密码管理局发起的TCM芯片,可以参考“可信计算密码支撑平台功能与接口规范”,而且已经成为国家标准,即GB/T 29829-2013。TCM2.0标准即将正式发布。

立即下载
CSharp - Module 1_Overview of the Microsoft .NET Platform

CSharp - Module 1_Overview of the Microsoft .NET Platform

立即下载
mpp-release.zip

Media Process Platform (MPP) module directory description

立即下载
OV8858 csp document

For building up OV8858 camera module on MTK platform

立即下载

热点文章

img

spring mvc+mybatis+mysql+maven+bootstrap 整合实现增删查改简单实例.zip

资源所需积分/C币 当前拥有积分 当前拥有C币
5 0 0
点击完成任务获取下载码
输入下载码
为了良好体验,不建议使用迅雷下载
img

A Practical Guide to TPM 2.0 Using the Trusted Platform Module

会员到期时间: 剩余下载个数: 剩余C币: 剩余积分:0
为了良好体验,不建议使用迅雷下载
VIP下载
您今日下载次数已达上限(为了良好下载体验及使用,每位用户24小时之内最多可下载20个资源)

积分不足!

资源所需积分/C币 当前拥有积分
您可以选择
开通VIP
4000万
程序员的必选
600万
绿色安全资源
现在开通
立省522元
或者
购买C币兑换积分 C币抽奖
img

资源所需积分/C币 当前拥有积分 当前拥有C币
5 4 45
为了良好体验,不建议使用迅雷下载
确认下载
img

资源所需积分/C币 当前拥有积分 当前拥有C币
14 0 0
为了良好体验,不建议使用迅雷下载
VIP和C币套餐优惠
img

资源所需积分/C币 当前拥有积分 当前拥有C币
5 4 45
您的积分不足,将扣除 10 C币
为了良好体验,不建议使用迅雷下载
确认下载
下载
您还未下载过该资源
无法举报自己的资源

兑换成功

你当前的下载分为234开始下载资源
你还不是VIP会员
开通VIP会员权限,免积分下载
立即开通

你下载资源过于频繁,请输入验证码

您因违反CSDN下载频道规则而被锁定帐户,如有疑问,请联络:webmaster@csdn.net!

举报

  • 举报人:
  • 被举报人:
  • *类型:
    • *投诉人姓名:
    • *投诉人联系方式:
    • *版权证明:
  • *详细原因: