• Complain

Will Arthur - A Practical Guide to TPM 2.0: Using the New Trusted Platform Module in the New Age of Security

Here you can read online Will Arthur - A Practical Guide to TPM 2.0: Using the New Trusted Platform Module in the New Age of Security full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: Berkeley;CA, year: 2015, publisher: Apress, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Will Arthur A Practical Guide to TPM 2.0: Using the New Trusted Platform Module in the New Age of Security

A Practical Guide to TPM 2.0: Using the New Trusted Platform Module in the New Age of Security: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "A Practical Guide to TPM 2.0: Using the New Trusted Platform Module in the New Age of Security" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their usage in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM. The approach is to ramp the reader up quickly and keep their interest. A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security explains security concepts, describes TPM 2.0 architecture, and provides coding examples in parallel beginning with very simple concepts and simple code to highly complex concepts and code. The book includes access to a live execution environment (secure, hosted virtualization) and real code examples to get readers up and talking to the TPM quickly. The authors then help the users expand on that with real examples of useful apps using the TPM.

Will Arthur: author's other books


Who wrote A Practical Guide to TPM 2.0: Using the New Trusted Platform Module in the New Age of Security? Find out the surname, the name of the author of the book and a list of all author's works by series.

A Practical Guide to TPM 2.0: Using the New Trusted Platform Module in the New Age of Security — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "A Practical Guide to TPM 2.0: Using the New Trusted Platform Module in the New Age of Security" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make

A Practical Guide to TPM 20 Using the New Trusted Platform Module in the New Age of Security - image 1

A Practical Guide to TPM 2.0

Using the Trusted Platform Module in the New Age of Security

A Practical Guide to TPM 20 Using the New Trusted Platform Module in the New Age of Security - image 2

Will Arthur

David Challener

With Kenneth Goldman

A Practical Guide to TPM 20 Using the New Trusted Platform Module in the New - photo 3

A Practical Guide to TPM 2.0: Using the New Trusted Platform Module in the New Age of Security Will Arthur & David Challener

Copyright 2015 by Apress Media, LLC, all rights reserved

ApressOpen Rights: You have the right to copy, use and distribute this Work in its entirety, electronically without modifi cation, for non-commercial purposes only. However, you have the additional right to use or alter any source code in this Work for any commercial or non-commercial purpose which must be accompanied by the licenses in (2) and (3) below to distribute the source code for instances of greater than 5 lines of code. Following this Apress rights section, you will fi nd copyright notices for material used in this book by permission. If you wish to reuse this material, you must include the corresponding copyright language provided. For material used with permission from the Trusted Computing Group, you may have rights in addition to the rights granted by this ApressOpen license. Licenses (1), (2) and (3) below and the intervening text must be provided in any use of the text of the Work and it, along with additional copyright notices, fully describes the license granted herein to the Work.

(1) License for Distribution of the Work: Th is Work is copyrighted by Apress Media, LLC, all rights reserved. Use of this Work other than as provided for in this license is prohibited. By exercising any of the rights herein, you are accepting the terms of this license. You have the non-exclusive right to copy, use and distribute this English language Work in its entirety, electronically without modifi cation except for those modifi cations necessary for formatting on specifi c devices, for all non-commercial purposes, in all media and formats known now or hereafter. While the advice and information in this Work are believed to be true and accurate at the date of publication, neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors or omissions that may be made. The publisher makes no warranty, express or implied, with respect to the material contained herein.

If your distribution is solely Apress source code or uses Apress source code intact, the following licenses (2) and (3) must accompany the source code. If your use is an adaptation of the source code provided by Apress in this Work, then you must use only license (3).

(2) License for Direct Reproduction of Apress Source Code: Th is source code, excepting the source code copyrighted by Intel as noted below, from A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security, ISBN 978-1-4302-6583-2 is copyrighted by Apress Media, LLC, all rights reserved. Any direct reproduction of this Apress source code is permitted but must contain this license. The following license must be provided for any use of the source code from this product of greater than 5 lines wherein the code is adapted or altered from its original Apress form. Th is Apress code is presented AS IS and Apress makes no claims to, representations or warrantees as to the function, usability, accuracy or usefulness of this code.

(3) License for Distribution of Adaptation of Apress Source Code: Portions of the source code, excepting the source code copyrighted by Intel as noted below, provided are used or adapted from A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security, ISBN 978-1-4302-6583-2 copyright Apress Media LLC. Any use or reuse of this Apress source code must contain this License. Th is Apress code is made available at Apress.com/9781430265832 as is and Apress makes no claims to, representations or warrantees as to the function, usability, accuracy or usefulness of this code.

Diagram from the section AMD Secure Technology in Chapter 22 Copyright by Advanced Micro Devices, Inc., 2015.

Tables, commands, and diagrams reproduced with permission of Trusted Computing Group, TCG 2014: Tables 5-1, 5-2, 5-3, 5-4, 5-5, 5-6, 5-7; code following Table 5-7; and fi gures 7-1, 13-3, 13-4, 13-5, 13-6, 13-7, 13-8, 13-9, 13-10, 13-11, 13-14, 13-15. See http://www.trustedcomputinggroup.org/legal_notices for current TCG license terms, conditions, and disclaimers. Th is document may provide you with additional rights to these items not granted in the ApressOpen rights above.

Publisher gratefully acknowledges the permission granted by Intel to use the following materials in this work. All rights and interest in that material belong to Intel: code in Chapter 7, SAPI section; code in Chapter 17; Figures 13-1, 13-2, 13-12, and 13-13; and Listings 13-1 and 13-2. Publisher grants that Intel can re-print and reuse these diagrams and source code and that these materials are being used in this book with Intels permission.

Intel is a trademark of Intel Corporation in the U.S. and/or other countries.

ISBN-13 (pbk): 978-1-4302-6583-2

ISBN-13 (electronic): 978-1-4302-6584-9

Trademarked names, logos, and images may appear in this book. Rather than use a trademark symbol wiThevery occurrence of a trademarked name, logo, or image we use the names, logos, and images only in an editorial fashion and to the benefi t of the trademark owner, with no intention of infringement of the trademark.

The use in this publication of trade names, trademarks, service marks, and similar terms, even if they arent identifi ed as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights.

While the advice and information in this book are believed to be true and accurate at the date of publication, neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors or omissions that may be made. The publisher makes no warranty, express or implied, with respect to the material contained herein.

Managing Director: Welmoed Spahr

Associate Publisher: Jeff rey Pepper

Lead Editors: Steve Weiss (Apress); Patrick Hauke (Intel)

Coordinating Editor: Melissa Maldonado

Cover Designer: Anna Ishchenko

Distributed to the book trade worldwide by Springer Science+Business Media New York, 233 Spring Street, 6th Floor, New York, NY 10013. Phone 1-800-SPRINGER, fax (201) 348-4505, e-mail .

For information on translations, please e-mail .

About ApressOpen

What Is ApressOpen?

  • ApressOpen is an open access book program that publishes high-quality technical and business information.
  • ApressOpen eBooks are available for global, free, noncommercial use.
  • ApressOpen eBooks are available in PDF, ePub, and Mobi formats.
  • The user friendly ApressOpen free eBook license is presented on the copyright page of this book.

I dedicate my portions of this work to my wife Ruth, and sons Tim and Stephen D. Challener

To pastor Jon MacKinney and Intel managers Linda Zavaleta and Jody Pfotenhauer, who encouraged me to pursue an engineering degree at an age when many men start thinking about retirement. To John Pennington and Monty Wiseman: for support and mentoring. To my wife, Tammy, and daughters, Casey, Megan, and Rachel: for your patience and support as Ive ridden this high-tech roller coaster for the past 30 years. Most of all to Jesus Christ, my ultimate source of security. Will Arthur

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «A Practical Guide to TPM 2.0: Using the New Trusted Platform Module in the New Age of Security»

Look at similar books to A Practical Guide to TPM 2.0: Using the New Trusted Platform Module in the New Age of Security. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «A Practical Guide to TPM 2.0: Using the New Trusted Platform Module in the New Age of Security»

Discussion, reviews of the book A Practical Guide to TPM 2.0: Using the New Trusted Platform Module in the New Age of Security and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.