Trusted computing
The current environment
Anatomy of an attack
LaGrande technology objectives
Design principles
Protected execution
Attestation
Protected input & output
Late launch
Hardware attacks
Defending the platform against attack
The future
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
GRATIS per la spedizione in U.S.A.
Destinazione, tempi e costiDa: ZBK Books, Carlstadt, NJ, U.S.A.
Condizione: good. Fast & Free Shipping â" Good condition with a solid cover and clean pages. Shows normal signs of use such as light wear or a few marks highlighting, but overall a well-maintained copy ready to enjoy. Supplemental items like CDs or access codes may not be included. Codice articolo ZWV.0976483262.G
Quantità: 1 disponibili
Da: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
Paperback. Condizione: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less. Codice articolo G0976483262I3N00
Quantità: 1 disponibili