• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611
Trusted Platform Modules: Why, When and How to Use Them

Trusted Platform Modules: Why, When and How to Use Them

Hardcover

Series: Computing and Networks

General ComputersNetworkingComputer Security

ISBN10: 1849198934
ISBN13: 9781849198936
Publisher: Institution Of Engineering & T
Published: Nov 23 2016
Pages: 384
Weight: 1.45
Height: 1.00 Width: 6.40 Depth: 9.50
Language: English

Trusted Platform Modules (TPMs) are small, inexpensive chips which provide a limited set of security functions. They are most commonly found as a motherboard component on laptops and desktops aimed at the corporate or government markets, but can also be found on many consumer-grade machines and servers, or purchased as independent components. Their role is to serve as a Root of Trust - a highly trusted component from which we can bootstrap trust in other parts of a system. TPMs are most useful for three kinds of tasks: remotely identifying a machine, or machine authentication; providing hardware protection of secrets, or data protection; and providing verifiable evidence about a machine's state, or attestation.

Also in

Computer Security