Target New ArrivalsGift Ideas for DadClothing, Shoes & AccessoriesHome & DecorKitchen & DiningOutdoor Living & GardenGroceryHousehold EssentialsBabyBeautyPersonal CareSports & OutdoorsHealthWellnessLuggageSchool & Office SuppliesToysElectronicsVideo GamesMovies, Music & BooksParty SuppliesGift IdeasGift CardsPetsUlta Beauty at TargetShop by CommunityTarget OpticalDealsClearanceNew ArrivalsSpring OutfitsGift Ideas for MomWomen’s Festival OutfitsTop DealsTarget Circle DealsWeekly AdShop Order PickupShop Same Day DeliveryRegistryRedCardTarget CircleFind Stores
Trusted Platform Modules - (Computing and Networks) by  Ariel Segall (Hardcover) - 1 of 1

Trusted Platform Modules - (Computing and Networks) by Ariel Segall (Hardcover)

$135.00

In Stock

Free & easy returns

Free & easy returns

Return this item by mail or in store within 90 days for a full refund.
Eligible for registries and wish lists

About this item

Highlights

  • Trusted Platform Modules (TPMs) are small, inexpensive chips which provide a limited set of security functions.
  • Author(s): Ariel Segall
  • 384 Pages
  • Computers + Internet, Security
  • Series Name: Computing and Networks

Description



About the Book



This book describes the primary uses for Trusted Platform Modules (TPMs) and practical considerations such as when TPMs can and should be used, when they shouldn't be, what advantages they provide, and how to actually make use of them, with use cases and worked examples of how to implement these use cases on a real system.



Book Synopsis



Trusted Platform Modules (TPMs) are small, inexpensive chips which provide a limited set of security functions. They are most commonly found as a motherboard component on laptops and desktops aimed at the corporate or government markets, but can also be found on many consumer-grade machines and servers, or purchased as independent components. Their role is to serve as a Root of Trust - a highly trusted component from which we can bootstrap trust in other parts of a system. TPMs are most useful for three kinds of tasks: remotely identifying a machine, or machine authentication; providing hardware protection of secrets, or data protection; and providing verifiable evidence about a machine's state, or attestation.

This book describes the primary uses for TPMs, and practical considerations such as when TPMs can and should be used, when they shouldn't be, what advantages they provide, and how to actually make use of them, with use cases and worked examples of how to implement these use cases on a real system. Topics covered include when to use a TPM; TPM concepts and functionality; programming introduction; provisioning: getting the TPM ready to use; first steps: TPM keys; machine authentication; data protection; attestation; other TPM features; software and specifications; and troubleshooting. Appendices contain basic cryptographic concepts; command equivalence and requirements charts; and complete code samples.

Dimensions (Overall): 9.5 Inches (H) x 6.4 Inches (W) x 1.0 Inches (D)
Weight: 1.45 Pounds
Suggested Age: 22 Years and Up
Number of Pages: 384
Genre: Computers + Internet
Sub-Genre: Security
Series Title: Computing and Networks
Publisher: Institution of Engineering & Technology
Theme: General
Format: Hardcover
Author: Ariel Segall
Language: English
Street Date: November 23, 2016
TCIN: 1011334931
UPC: 9781849198936
Item Number (DPCI): 247-13-4120
Origin: Made in the USA or Imported
If the item details aren’t accurate or complete, we want to know about it.

Shipping details

Estimated ship dimensions: 1 inches length x 6.4 inches width x 9.5 inches height
Estimated ship weight: 1.45 pounds
We regret that this item cannot be shipped to PO Boxes.
This item cannot be shipped to the following locations: American Samoa (see also separate entry under AS), Guam (see also separate entry under GU), Northern Mariana Islands, Puerto Rico (see also separate entry under PR), United States Minor Outlying Islands, Virgin Islands, U.S., APO/FPO, Alaska, Hawaii

Return details

This item can be returned to any Target store or Target.com.
This item must be returned within 90 days of the date it was purchased in store, delivered to the guest, delivered by a Shipt shopper, or picked up by the guest.
See the return policy for complete information.

Q: Who is the author of this book on Trusted Platform Modules?

submitted by AI Shopping Assistant - 6 days ago
  • A: The book is authored by Ariel Segall, focusing on computing and network security.

    submitted byAI Shopping Assistant - 6 days ago
    Ai generated

Q: What are the primary uses of Trusted Platform Modules?

submitted by AI Shopping Assistant - 6 days ago
  • A: TPMs are used for machine authentication, data protection, and providing verifiable evidence about a machine's state.

    submitted byAI Shopping Assistant - 6 days ago
    Ai generated

Q: What practical considerations are discussed in the book?

submitted by AI Shopping Assistant - 6 days ago
  • A: The book covers when to use TPMs, their advantages, and how to implement them effectively.

    submitted byAI Shopping Assistant - 6 days ago
    Ai generated

Q: What is the format and page count of the book?

submitted by AI Shopping Assistant - 6 days ago
  • A: The book is a hardcover edition with a total of 384 pages.

    submitted byAI Shopping Assistant - 6 days ago
    Ai generated

Q: What topics related to TPMs are included in the book?

submitted by AI Shopping Assistant - 6 days ago
  • A: Topics include TPM concepts, programming, machine authentication, data protection, and troubleshooting.

    submitted byAI Shopping Assistant - 6 days ago
    Ai generated

Additional product information and recommendations

Discover more options

Trending Computers & Technology Books

Get top deals, latest trends, and more.

Privacy policy