Trusted computing:
This book provides an introduction to trusted computing technology and its applications. As computers are increasingly embedded and wireless connected, security becomes imperative. This has resulted in the development of the notion of a "trusted platform", the main feature of which is the...
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Palo Alto, Calif
ebrary
2005
London Institution of Electrical Engineers |
Schriftenreihe: | IEE professional applications of computing series
6 |
Schlagworte: | |
Zusammenfassung: | This book provides an introduction to trusted computing technology and its applications. As computers are increasingly embedded and wireless connected, security becomes imperative. This has resulted in the development of the notion of a "trusted platform", the main feature of which is the possession of a trusted hardware element capable of checking all or part of the software running on this platform. This new book introduces recent technological developments in trusted computing, and surveys the various current approaches to providing trusted platforms. The book includes application examples |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | 1 Online-Ressource ill 25 cm |
ISBN: | 9781849190473 0863415253 9780863415258 |
Internformat
MARC
LEADER | 00000nmm a2200000 cb4500 | ||
---|---|---|---|
001 | BV041946358 | ||
003 | DE-604 | ||
005 | 20140910 | ||
007 | cr|uuu---uuuuu | ||
008 | 140630s2005 |||| o||u| ||||||eng d | ||
020 | |a 9781849190473 |c eressource |9 978-1-84919-047-3 | ||
020 | |a 0863415253 |c hbk. |9 0-86341-525-3 | ||
020 | |a 9780863415258 |c hbk. |9 978-0-86341-525-8 | ||
035 | |a (OCoLC)915492267 | ||
035 | |a (DE-599)GBV686290224 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-11 | ||
050 | 0 | |a QA76.9.A25 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
245 | 1 | 0 | |a Trusted computing |c edited by Chris Mitchell |
264 | 1 | |a Palo Alto, Calif |b ebrary | |
264 | 1 | |a London |b Institution of Electrical Engineers |c 2005 | |
300 | |a 1 Online-Ressource |b ill |c 25 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a IEE professional applications of computing series |v 6 | |
500 | |a Includes bibliographical references and index | ||
520 | 1 | |a This book provides an introduction to trusted computing technology and its applications. As computers are increasingly embedded and wireless connected, security becomes imperative. This has resulted in the development of the notion of a "trusted platform", the main feature of which is the possession of a trusted hardware element capable of checking all or part of the software running on this platform. This new book introduces recent technological developments in trusted computing, and surveys the various current approaches to providing trusted platforms. The book includes application examples | |
533 | |a Online-Ausgabe |d 2011 |e (xiv, 313 p) |7 s2011 | ||
650 | 0 | 7 | |a Vertrauenswürdigkeit |0 (DE-588)4209886-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenverarbeitungssystem |0 (DE-588)4125229-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Datenverarbeitungssystem |0 (DE-588)4125229-9 |D s |
689 | 0 | 1 | |a Vertrauenswürdigkeit |0 (DE-588)4209886-5 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Mitchell, Chris |4 edt | |
710 | 2 | |a Institution of Electrical Engineers |e Sonstige |0 (DE-588)1730-9 |4 oth | |
776 | 0 | 8 | |i Reproduktion von |t Trusted computing |d 2005 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |t Trusted Computing |
830 | 0 | |a IEE professional applications of computing series |v 6 |w (DE-604)BV013051921 |9 6 | |
912 | |a ZDB-38-EBR | ||
940 | 1 | |q HUB_PDA_EBR_Kauf | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027389431 |
Datensatz im Suchindex
_version_ | 1804152325128847360 |
---|---|
any_adam_object | |
author2 | Mitchell, Chris |
author2_role | edt |
author2_variant | c m cm |
author_facet | Mitchell, Chris |
building | Verbundindex |
bvnumber | BV041946358 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 277 |
collection | ZDB-38-EBR |
ctrlnum | (OCoLC)915492267 (DE-599)GBV686290224 |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02416nmm a2200493 cb4500</leader><controlfield tag="001">BV041946358</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20140910 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">140630s2005 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849190473</subfield><subfield code="c">eressource</subfield><subfield code="9">978-1-84919-047-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0863415253</subfield><subfield code="c">hbk.</subfield><subfield code="9">0-86341-525-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780863415258</subfield><subfield code="c">hbk.</subfield><subfield code="9">978-0-86341-525-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)915492267</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBV686290224</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-11</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Trusted computing</subfield><subfield code="c">edited by Chris Mitchell</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Palo Alto, Calif</subfield><subfield code="b">ebrary</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London</subfield><subfield code="b">Institution of Electrical Engineers</subfield><subfield code="c">2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield><subfield code="b">ill</subfield><subfield code="c">25 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">IEE professional applications of computing series</subfield><subfield code="v">6</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1="1" ind2=" "><subfield code="a">This book provides an introduction to trusted computing technology and its applications. As computers are increasingly embedded and wireless connected, security becomes imperative. This has resulted in the development of the notion of a "trusted platform", the main feature of which is the possession of a trusted hardware element capable of checking all or part of the software running on this platform. This new book introduces recent technological developments in trusted computing, and surveys the various current approaches to providing trusted platforms. The book includes application examples</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Online-Ausgabe</subfield><subfield code="d">2011</subfield><subfield code="e">(xiv, 313 p)</subfield><subfield code="7">s2011</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Vertrauenswürdigkeit</subfield><subfield code="0">(DE-588)4209886-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenverarbeitungssystem</subfield><subfield code="0">(DE-588)4125229-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datenverarbeitungssystem</subfield><subfield code="0">(DE-588)4125229-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Vertrauenswürdigkeit</subfield><subfield code="0">(DE-588)4209886-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mitchell, Chris</subfield><subfield code="4">edt</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Institution of Electrical Engineers</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1730-9</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Reproduktion von</subfield><subfield code="t">Trusted computing</subfield><subfield code="d">2005</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="t">Trusted Computing</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">IEE professional applications of computing series</subfield><subfield code="v">6</subfield><subfield code="w">(DE-604)BV013051921</subfield><subfield code="9">6</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-38-EBR</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">HUB_PDA_EBR_Kauf</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027389431</subfield></datafield></record></collection> |
id | DE-604.BV041946358 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:08:55Z |
institution | BVB |
institution_GND | (DE-588)1730-9 |
isbn | 9781849190473 0863415253 9780863415258 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027389431 |
oclc_num | 915492267 |
open_access_boolean | |
owner | DE-11 |
owner_facet | DE-11 |
physical | 1 Online-Ressource ill 25 cm |
psigel | ZDB-38-EBR HUB_PDA_EBR_Kauf |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | ebrary Institution of Electrical Engineers |
record_format | marc |
series | IEE professional applications of computing series |
series2 | IEE professional applications of computing series |
spelling | Trusted computing edited by Chris Mitchell Palo Alto, Calif ebrary London Institution of Electrical Engineers 2005 1 Online-Ressource ill 25 cm txt rdacontent c rdamedia cr rdacarrier IEE professional applications of computing series 6 Includes bibliographical references and index This book provides an introduction to trusted computing technology and its applications. As computers are increasingly embedded and wireless connected, security becomes imperative. This has resulted in the development of the notion of a "trusted platform", the main feature of which is the possession of a trusted hardware element capable of checking all or part of the software running on this platform. This new book introduces recent technological developments in trusted computing, and surveys the various current approaches to providing trusted platforms. The book includes application examples Online-Ausgabe 2011 (xiv, 313 p) s2011 Vertrauenswürdigkeit (DE-588)4209886-5 gnd rswk-swf Datenverarbeitungssystem (DE-588)4125229-9 gnd rswk-swf Datenverarbeitungssystem (DE-588)4125229-9 s Vertrauenswürdigkeit (DE-588)4209886-5 s DE-604 Mitchell, Chris edt Institution of Electrical Engineers Sonstige (DE-588)1730-9 oth Reproduktion von Trusted computing 2005 Erscheint auch als Druck-Ausgabe Trusted Computing IEE professional applications of computing series 6 (DE-604)BV013051921 6 |
spellingShingle | Trusted computing IEE professional applications of computing series Vertrauenswürdigkeit (DE-588)4209886-5 gnd Datenverarbeitungssystem (DE-588)4125229-9 gnd |
subject_GND | (DE-588)4209886-5 (DE-588)4125229-9 |
title | Trusted computing |
title_auth | Trusted computing |
title_exact_search | Trusted computing |
title_full | Trusted computing edited by Chris Mitchell |
title_fullStr | Trusted computing edited by Chris Mitchell |
title_full_unstemmed | Trusted computing edited by Chris Mitchell |
title_short | Trusted computing |
title_sort | trusted computing |
topic | Vertrauenswürdigkeit (DE-588)4209886-5 gnd Datenverarbeitungssystem (DE-588)4125229-9 gnd |
topic_facet | Vertrauenswürdigkeit Datenverarbeitungssystem |
volume_link | (DE-604)BV013051921 |
work_keys_str_mv | AT mitchellchris trustedcomputing AT institutionofelectricalengineers trustedcomputing |