Rating:
Voted: 0

Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security


Will Arthur, David Challener, "A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security"

English | 2015 | PDF | 392 pages | 5 MB


14 Days Free Access to USENET
Free 300 GB with 10 GB High-Speed

Could be also interesting for you:

  • Trusted Computing Platforms: TPM2.0 in Context

    Trusted Computing Platforms: TPM2.0 in Context
  • Trusted Computing for Embedded Systems

    Trusted Computing for Embedded Systems
  • Trusted Cloud Computing

    Trusted Cloud Computing
  • A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New ...

    A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New  ...
  • Practical Hadoop Security

    Practical Hadoop Security
  • Android Security Internals: An In-Depth Guide to Android's Security Archite ...

    Android Security Internals: An In-Depth Guide to Android's Security Archite ...
  • The Manager's Guide to Web Application Security: A Concise Guide to the Wea ...

    The Manager's Guide to Web Application Security: A Concise Guide to the Wea ...
  • Platform Embedded Security Technology Revealed

    Platform Embedded Security Technology Revealed
  • Intel Trusted Execution Technology for Server Platforms: A Guide to More Se ...

    Intel Trusted Execution Technology for Server Platforms: A Guide to More Se ...
  • Inside Java 2 Platform Security: Architecture, API Design, and Implementati ...

    Inside Java 2 Platform Security: Architecture, API Design, and Implementati ...

Popular Ebooks