Book description
TCPA: Building computing platforms upon a solid foundation of trust.
As businesses stake their very existence on the Internet, PCs, PDAs, and other key computing platforms, the trustworthiness of these platforms has become a vital concern. In response, the Trusted Computing Platform Alliance (TCPA) has delivered a complete specification for building trusted computing platforms atop trusted hardware. In Trusted Computing Platforms, leaders of the initiative illuminate TCPA for every systems developer and decision-maker. They place TCPA in context, outlining its goals, techniques, and powerful implications for the future.
What trusted computing platforms are, how they work, and what problems they will solve
Transforming standard platforms into trusted platforms cost-effectively
Scenarios for managers: TCPA applications in the security-focused business
Protected storage: how TCPA can ensure the confidentiality of stored data
Software integrity: ensuring that a system's software environment hasn't been tampered with
Trust mechanisms in a trusted platform: functional descriptions, advantages, and overhead
Trusted platforms in practice: TCPA for developers and technical professionals
How trusted platforms can be used to protect user privacy
The TCPA initiative: its history, status, and next steps forward
Backed by an extraordinary range of industry leaders, TCPA offers the first complete, cost-effective, and globally applicable solution for trusted computing. Whether you develop new systems or apply them in business or government, you need to understand this technology—and with this book, you will.
Table of contents
- Copyright
- Hewlett-Packard® Professional Books
- Foreword
- Preface
- About the Authors
- Introducing Trusted Platform Technology
- Trust Mechanisms in a Trusted Platform
- Trusted Platforms In Practice
- Trusted Platforms for Organizations and Individuals
- Index
Product information
- Title: Trusted Computing Platforms: TCPA Technology in Context
- Author(s):
- Release date: July 2002
- Publisher(s): Pearson
- ISBN: 0130092207
You might also like
book
Platform Embedded Security Technology Revealed : Safeguarding the Future of Computing with Intel Embedded Security and Management Engine
is an in-depth introduction to Intel's platform embedded solution: the security and management engine. The engine …
book
Embedded Firmware Solutions: Development Best Practices for the Internet of Th ings
is the perfect introduction and daily-use field guide--for the thousands of firmware designers, hardware engineers, architects, …
book
Managing Trust in Cyberspace
Bringing together cross-disciplinary expertise, this illustrated, tutorial-style text addresses fundamentals underpinning computational trust models and covers …
book
A Practical Guide to Trusted Computing
Use Trusted Computing to Make PCs Safer, More Secure, and More Reliable Every year, computer security …