Record ID | ia:trustedcomputing0000unse |
Source | Internet Archive |
Download MARC XML | https://archive.org/download/trustedcomputing0000unse/trustedcomputing0000unse_marc.xml |
Download MARC binary | https://www.archive.org/download/trustedcomputing0000unse/trustedcomputing0000unse_meta.mrc |
LEADER: 03415cam 2200589 a 4500
001 ocm50100872
003 OCoLC
005 20181204204422.0
008 030328s2003 njua b 001 0 eng
010 $a 2003266565
040 $aUKM$beng$cDLC$dUKM$dTXA$dIXA$dC#P$dGZM$dBAKER$dBTCTA$dYDXCP$dHEBIS$dVMC$dOCLCF$dOCLCQ$dOCLCO$dOCLCQ$dUWO$dOCLCO$dOCLCA
015 $aGBA2W5260$2bnb
020 $a0130092207
020 $a9780130092205
035 $a(OCoLC)50100872
042 $alccopycat
050 00 $aQA76.9.A25$bT75 2003
082 00 $a005.8$222
245 00 $aTrusted computing platforms :$bTCPA technology in context /$cSiani Pearson, editor ; Boris Balacheff [and others].
260 $aUpper Saddle River, N.J. :$bPrentice Hall PTR,$c℗♭2003.
300 $axxvi, 322 pages :$billustrations ;$c25 cm
336 $atext$btxt$2rdacontent
337 $aunmediated$bn$2rdamedia
338 $avolume$bnc$2rdacarrier
490 1 $aHewlett-Packard professional books
504 $aIncludes bibliographical references (pages 305-308) and index.
505 0 $apt. 1. Introducing Trusted Platform Technology. Ch. 1. Trusted (Computing) Platforms: An Overview. Ch. 2. Usage Scenarios. Ch. 3. Key Components of Trusted Platform Technology -- pt. 2. Trust Mechanisms in a Trusted Platform. Ch. 4. Access Control -- Ownership, Enabling, and Authorization. Ch. 5. Platform Identification and Certification. Ch. 6. Integrity Recording, Reporting, and Secure Boot. Ch. 7. Protected Storage. Ch. 8. Migration and Maintenance Mechanisms. Ch. 9. Conventional Security Functions and Assorted Host Functions -- pt. 3. Trusted Platforms In Practice. Ch. 10. Bringing a Trusted Platform to Life. Ch. 11. Building Trust. Ch. 12. Challenging a Trusted Platform -- pt. 4. Trusted Platforms for Organizations and Individuals. Ch. 13. Corporate Deployment of Trusted Platforms. Ch. 14. The Trusted Platform in Front of You -- App. A. Brief History of TCPA -- App. B. Trust Models and the E-Commerce Domain -- App. C. Basic Cryptographic Primitives Used in the TCPA Specification.
650 0 $aComputer security$xStandards.
650 0 $aComputer networks$xSecurity measures.
650 0 $aElectronic information resources$xAccess control.
650 7 $aComputer networks$xSecurity measures.$2fast$0(OCoLC)fst00872341
650 7 $aComputer security$xStandards.$2fast$0(OCoLC)fst00872495
650 7 $aElectronic information resources$xAccess control.$2fast$0(OCoLC)fst00907296
650 7 $aDatensicherung$2gnd
650 7 $aComputersicherheit$2gnd
700 1 $aPearson, Siani.
700 1 $aBalacheff, Boris.
776 08 $iOnline version:$tTrusted computing platforms.$dUpper Saddle River, N.J. : Prentice Hall PTR, ℗♭2003$w(OCoLC)606255141
776 08 $iOnline version:$tTrusted computing platforms.$dUpper Saddle River, N.J. : Prentice Hall PTR, ℗♭2003$w(OCoLC)606819924
830 0 $aHewlett-Packard professional books.
938 $aBaker & Taylor$bBKTY$c49.99$d37.49$i0130092207$n0003940900$sactive
938 $aBaker and Taylor$bBTCP$n2003266565
938 $aYBP Library Services$bYANK$n1868118
029 1 $aAU@$b000024142234
029 1 $aAU@$b000024684231
029 1 $aAU@$b000024783710
029 1 $aAU@$b000025115126
029 1 $aHEBIS$b107415984
029 1 $aNZ1$b7005164
029 1 $aYDXCP$b1868118
994 $aZ0$bP4A
948 $hNO HOLDINGS IN P4A - 103 OTHER HOLDINGS