Platform Embedded Security Technology Revealed
Platform Embedded Security Technology Revealed is an in-depth introduction to Intel’s platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and...
I tiakina i:
Kaituhi matua: | Ruan, Xiaoyu (Author) |
---|---|
Kaituhi rangatōpū: | SpringerLink (Online service) |
Hōputu: | Tāhiko īPukapuka |
Reo: | Ingarihi |
I whakaputaina: |
Berkeley, CA :
Apress : Imprint: Apress,
2014.
|
Ngā marau: | |
Urunga tuihono: | http://dx.doi.org/10.1007/978-1-4302-6572-6 |
Ngā Tūtohu: |
Tāpirihia he Tūtohu
Kāore He Tūtohu, Me noho koe te mea tuatahi ki te tūtohu i tēnei pūkete!
|
Ngā tūemi rite
A Practical Guide to TPM 2.0 Using the New Trusted Platform Module in the New Age of Security /
mā: Arthur, Will, me ētahi atu.
I whakaputaina: (2015)
mā: Arthur, Will, me ētahi atu.
I whakaputaina: (2015)
The Privacy Engineer’s Manifesto Getting from Policy to Code to QA to Value /
mā: Dennedy, Michelle Finneran, me ētahi atu.
I whakaputaina: (2014)
mā: Dennedy, Michelle Finneran, me ētahi atu.
I whakaputaina: (2014)
Intel® Trusted Execution Technology for Server Platforms A Guide to More Secure Datacenters /
mā: Futral, William, me ētahi atu.
I whakaputaina: (2013)
mā: Futral, William, me ētahi atu.
I whakaputaina: (2013)
Building the Infrastructure for Cloud Security A Solutions view /
mā: Yeluri, Raghu, me ētahi atu.
I whakaputaina: (2014)
mā: Yeluri, Raghu, me ētahi atu.
I whakaputaina: (2014)
The InfoSec Handbook An Introduction to Information Security /
mā: Rao, Umesh Hodeghatta, me ētahi atu.
I whakaputaina: (2014)
mā: Rao, Umesh Hodeghatta, me ētahi atu.
I whakaputaina: (2014)
Managing Risk and Information Security Protect to Enable /
mā: Harkins, Malcolm
I whakaputaina: (2013)
mā: Harkins, Malcolm
I whakaputaina: (2013)
Trusted platform module basics using TPM in embedded systems /
mā: Kinney, Steven
I whakaputaina: (2006)
mā: Kinney, Steven
I whakaputaina: (2006)
Quantum cryptography potentially perfect security.
I whakaputaina: (2003)
I whakaputaina: (2003)
Cryptography protocols, design and applications /
I whakaputaina: (2012)
I whakaputaina: (2012)
Securing information and communications systems principles, technologies, and applications /
I whakaputaina: (2008)
I whakaputaina: (2008)
Color image watermarking : algorithms and technologies /
mā: Su, Qingtang
I whakaputaina: (2017)
mā: Su, Qingtang
I whakaputaina: (2017)
Deploying and managing a cloud infrastructure : real world skills for the CompTIA cloud+ certification and beyond /
mā: Salam, Abdul
I whakaputaina: (2015)
mā: Salam, Abdul
I whakaputaina: (2015)
Identity-based cryptography
I whakaputaina: (2009)
I whakaputaina: (2009)
Hashing in computer science fifty years of slicing and dicing /
mā: Konheim, Alan G., 1934-
I whakaputaina: (2010)
mā: Konheim, Alan G., 1934-
I whakaputaina: (2010)
Modelling cyber security approaches, methodology, strategies /
I whakaputaina: (2009)
I whakaputaina: (2009)
A comparison between smart cards and trusted platform modules in business scenarios
mā: Murhammer, Martin W.
I whakaputaina: (2008)
mā: Murhammer, Martin W.
I whakaputaina: (2008)
Implementing SSH strategies for optimizing the Secure Shell /
mā: Dwivedi, Himanshu
I whakaputaina: (2004)
mā: Dwivedi, Himanshu
I whakaputaina: (2004)
Video encryption technology and application
mā: Xu, Zhengquan, 1962-
I whakaputaina: (2010)
mā: Xu, Zhengquan, 1962-
I whakaputaina: (2010)
Pro Git
mā: Chacon, Scott, me ētahi atu.
I whakaputaina: (2014)
mā: Chacon, Scott, me ētahi atu.
I whakaputaina: (2014)
Burdens of proof cryptographic culture and evidence law in the age of electronic documents /
mā: Blanchette, Jean-François
I whakaputaina: (2012)
mā: Blanchette, Jean-François
I whakaputaina: (2012)
Machine learning in image steganalysis
mā: Schaathun, Hans Georg
I whakaputaina: (2012)
mā: Schaathun, Hans Georg
I whakaputaina: (2012)
Understanding bitcoin : cryptography, engineering and economics. /
mā: Franco, Pedro
I whakaputaina: (2015)
mā: Franco, Pedro
I whakaputaina: (2015)
Cryptography and network security : principles and practice /
mā: Stallings, William
I whakaputaina: (2006)
mā: Stallings, William
I whakaputaina: (2006)
Outsourcing information security
mā: Axelrod, C. Warren
I whakaputaina: (2004)
mā: Axelrod, C. Warren
I whakaputaina: (2004)
Introduction to identity-based encryption
mā: Martin, Luther
I whakaputaina: (2008)
mā: Martin, Luther
I whakaputaina: (2008)
Brute Force Cracking the Data Encryption Standard /
mā: Curtin, Matt
I whakaputaina: (2005)
mā: Curtin, Matt
I whakaputaina: (2005)
Quantum cryptography and computing theory and implementation /
I whakaputaina: (2010)
I whakaputaina: (2010)
Relation based access control /
mā: Zhang, Rui
I whakaputaina: (2010)
mā: Zhang, Rui
I whakaputaina: (2010)
ExamWise for CIW security professional exam 1D0-470 /
mā: Bayer, Chad M.
I whakaputaina: (2003)
mā: Bayer, Chad M.
I whakaputaina: (2003)
Security secrets, intruders and ID tags.
I whakaputaina: (2003)
I whakaputaina: (2003)
GUI Design for Android Apps
mā: Cohen, Ryan, me ētahi atu.
I whakaputaina: (2014)
mā: Cohen, Ryan, me ētahi atu.
I whakaputaina: (2014)
Software design for engineers and scientists
mā: Robinson, John A.
I whakaputaina: (2004)
mā: Robinson, John A.
I whakaputaina: (2004)
Managing risk and information security : protect to enable /
mā: Harkins, Malcolm W
I whakaputaina: (2016)
mā: Harkins, Malcolm W
I whakaputaina: (2016)
Privacy and Identity Management for Life
mā: Camenisch, Jan
I whakaputaina: (2011)
mā: Camenisch, Jan
I whakaputaina: (2011)
Scaling a Software Business The Digitalization Journey /
mā: Fitzgerald, Brian, me ētahi atu.
I whakaputaina: (2017)
mā: Fitzgerald, Brian, me ētahi atu.
I whakaputaina: (2017)
Agile Processes in Software Engineering and Extreme Programming 18th International Conference, XP 2017, Cologne, Germany, May 22-26, 2017, Proceedings /
I whakaputaina: (2017)
I whakaputaina: (2017)
Exploring Harmonic Encryption Paradigm That Fuses Music And Cryptography In Enhancing Data Security
mā: Omollo, Richard Otieno, me ētahi atu.
I whakaputaina: (2025)
mā: Omollo, Richard Otieno, me ētahi atu.
I whakaputaina: (2025)
Journal of Software Engineering Research and Development
S-BPM in the Production Industry A Stakeholder Approach /
I whakaputaina: (2017)
I whakaputaina: (2017)
S-BPM in the Wild Practical Value Creation /
I whakaputaina: (2015)
I whakaputaina: (2015)
Ngā tūemi rite
-
A Practical Guide to TPM 2.0 Using the New Trusted Platform Module in the New Age of Security /
mā: Arthur, Will, me ētahi atu.
I whakaputaina: (2015) -
The Privacy Engineer’s Manifesto Getting from Policy to Code to QA to Value /
mā: Dennedy, Michelle Finneran, me ētahi atu.
I whakaputaina: (2014) -
Intel® Trusted Execution Technology for Server Platforms A Guide to More Secure Datacenters /
mā: Futral, William, me ētahi atu.
I whakaputaina: (2013) -
Building the Infrastructure for Cloud Security A Solutions view /
mā: Yeluri, Raghu, me ētahi atu.
I whakaputaina: (2014) -
The InfoSec Handbook An Introduction to Information Security /
mā: Rao, Umesh Hodeghatta, me ētahi atu.
I whakaputaina: (2014)