Contents
Chapter 1 Introduction to Trusted Computing
Computer Security Attacks Are Staggeringly Expensive
The Changing Threats to Computer Security
Malicious Programs: Viruses and Spyware/Adware
Social Engineering: Phishing and Pharming
Can Software Be Made Completely Secure?
Privacy and Recovery—Special Considerations for Hardware
Chapter 2 Design Goals of the Trusted Platform Module
Securely Reporting the Environment: Platform Status
Storing a Record of the Boot Sequence
Get A Practical Guide to Trusted Computing now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.