|
马上注册,结交更多好友,享用更多功能,让你轻松玩转社区。
您需要 登录 才可以下载或查看,没有账号?注册
x
http://www.amazon.com/Trusted-Platform-Module-Basics-Technology/dp/0750679603/ref=sr_1_1/105-1254510-1486027?ie=UTF8&s=books&qid=1180618707&sr=1-1
Book Description
* Clear, practical tutorial style text with real-world applications
* First book on TPM for embedded designers
* Provides a sound foundation on the TPM, helping designers take advantage of hardware security based on sound TCG standards
* Covers all the TPM basics, discussing in detail the TPM Key Hierarchy and the Trusted Platform
Module specification
* Presents a methodology to enable designers and
developers to successfully integrate the TPM into an embedded design and verify the TPM's operation on a specific platform
* Includes an accompanying CD-ROM that contains the full source code, which can be customized and used in embedded designsan extremely useful tool and timesaver for embedded developers!
This sound foundation on the TPM provides clear, practical tutorials with detailed real-world application examples
The author is reknowned for training embedded systems developers to successfully implement the TPM worldwide
CD-ROM includes source code which can be customized for different embedded applications
From the Back Cover
Security has become a key design consideration for many embedded engineers due to the significant advances in embedded systems networking capabilities. However, system security is difficult to manage, and the typical size, power, and cost limitations faced by embedded developers inhibit their use of many software-based cryptographic security models.
The Trusted Computing Groups (TCG) Trusted Platform Module (TPM) open standard, which facilitates hacker-safe computing at the hardware level, presents a possible solution to this quandary. Although PC designers dont particularly need to see inside the TPMs black box, embedded engineers must become intimately familiar with its functionality to enable security measure customization that conserves space, memory, and power.
In this practical guide, expert author Steven Kinney cuts through the complexities of the lengthy TPM specification to provide a targeted, solid foundation for understanding the standard.
This book encapsulates everything readers need to know in order to take advantage of hardware security based on sound TCG standards. It introduces the TPM interfaces basic concepts, then discusses command compilation and execution in detail, focusing on the TPM key hierarchy and the specification itself. The author presents a methodology that allows developers to successfully integrate the TPM into an embedded design and to verify the TPMs operation on a specific platform. Detailed real-world application examples throughout the book use the popular Atmel single-chip implementation of the TPM, which was created specifically for use in embedded designs.
Device drivers and useful tools are included on the accompanying CD-ROM.
[ 本帖最后由 Zyson 于 2007-5-31 21:47 编辑 ] |
-
-
Trusted platform module basics - using TPM in embedded systems.part1.rar
2 MB, 下载次数: 266
, 下载积分:
资产 -2 信元, 下载支出 2 信元
-
-
Trusted platform module basics - using TPM in embedded systems.part2.rar
2 MB, 下载次数: 227
, 下载积分:
资产 -2 信元, 下载支出 2 信元
-
-
Trusted platform module basics - using TPM in embedded systems.part3.rar
2 MB, 下载次数: 223
, 下载积分:
资产 -2 信元, 下载支出 2 信元
-
-
Trusted platform module basics - using TPM in embedded systems.part4.rar
2 MB, 下载次数: 229
, 下载积分:
资产 -2 信元, 下载支出 2 信元
-
-
Trusted platform module basics - using TPM in embedded systems.part5.rar
632.82 KB, 下载次数: 184
, 下载积分:
资产 -2 信元, 下载支出 2 信元
|