Cargando…
A practical guide to TPM 2.0: using the Trusted Platform Module in the new age of security
Autores principales: | , , |
---|---|
Lenguaje: | eng |
Publicado: |
Apress Open
2015
|
Materias: | |
Acceso en línea: | https://dx.doi.org/10.1007/978-1-4302-6584-9 http://cds.cern.ch/record/2022170 |
_version_ | 1780946985912631296 |
---|---|
author | Arthur, Will Challener, David Goldman, Kenneth |
author_facet | Arthur, Will Challener, David Goldman, Kenneth |
author_sort | Arthur, Will |
collection | CERN |
id | cern-2022170 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2015 |
publisher | Apress Open |
record_format | invenio |
spelling | cern-20221702021-04-21T20:14:55Zdoi:10.1007/978-1-4302-6584-9http://cds.cern.ch/record/2022170engArthur, WillChallener, DavidGoldman, KennethA practical guide to TPM 2.0: using the Trusted Platform Module in the new age of securityComputing and ComputersApress Openoai:cds.cern.ch:20221702015 |
spellingShingle | Computing and Computers Arthur, Will Challener, David Goldman, Kenneth A practical guide to TPM 2.0: using the Trusted Platform Module in the new age of security |
title | A practical guide to TPM 2.0: using the Trusted Platform Module in the new age of security |
title_full | A practical guide to TPM 2.0: using the Trusted Platform Module in the new age of security |
title_fullStr | A practical guide to TPM 2.0: using the Trusted Platform Module in the new age of security |
title_full_unstemmed | A practical guide to TPM 2.0: using the Trusted Platform Module in the new age of security |
title_short | A practical guide to TPM 2.0: using the Trusted Platform Module in the new age of security |
title_sort | practical guide to tpm 2.0: using the trusted platform module in the new age of security |
topic | Computing and Computers |
url | https://dx.doi.org/10.1007/978-1-4302-6584-9 http://cds.cern.ch/record/2022170 |
work_keys_str_mv | AT arthurwill apracticalguidetotpm20usingthetrustedplatformmoduleinthenewageofsecurity AT challenerdavid apracticalguidetotpm20usingthetrustedplatformmoduleinthenewageofsecurity AT goldmankenneth apracticalguidetotpm20usingthetrustedplatformmoduleinthenewageofsecurity AT arthurwill practicalguidetotpm20usingthetrustedplatformmoduleinthenewageofsecurity AT challenerdavid practicalguidetotpm20usingthetrustedplatformmoduleinthenewageofsecurity AT goldmankenneth practicalguidetotpm20usingthetrustedplatformmoduleinthenewageofsecurity |