feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Type of Medium
Language
Region
Subjects(RVK)
Access
  • 1
    Book
    Book
    New York, NY [u.a.] :McGraw-Hill,
    UID:
    almafu_BV023510809
    Format: Getr. Zählung : , Ill., graph. Darst.
    Edition: 2. ed.
    ISBN: 0-07-024321-2
    Language: English
    Subjects: Economics
    RVK:
    RVK:
    Keywords: Lagerhaltung ; Produktionsplanung ; Produktion ; Management ; Produktivitätszuwachs ; Aufsatzsammlung ; Aufsatzsammlung
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almahu_9949301315902882
    Format: 1 online resource (149 pages)
    ISBN: 9781430261490
    Note: Intro -- Contents at a Glance -- Contents -- Foreword -- About the Authors -- Acknowledgments -- Introduction -- Chapter 1: Introduction to Trust and Intel ® Trusted Execution Technology -- Why More Security ? -- Types of Attacks -- What Is Trust? How Can Hardware Help? -- What Is Intel® Trusted Execution Technology? -- Static Chain of Trust -- Dynamic Chain of Trust -- Virtualization -- Measured Launch Environment -- Finding Value in Trust -- Cloud Computing -- Attestation: The Founding Principle -- Value to System Software -- Cloud Service Provider/Cloud Service Client -- What Intel TXT Does Not Do -- Enhancements for Servers -- Including BIOS in the TCB -- Processor-Based CRTM -- Trusting the SMM -- Other Differences -- Impact of the Differences -- Roles and Responsibilities -- OEM -- Platform Owner -- Host Operating System -- Other Software -- Chapter 2: Fundamental Principles of Intel ® TXT -- What You Need: Definition of an Intel ® TXT-Capable System -- Intel® TXT-Capable Platform -- Intel TXT Platform Components -- Processor -- Chipset -- Trusted Platform Module (TPM) -- BIOS -- Authenticated Code Module (ACM) -- The Role of the Trusted Platform Module (TPM) -- TPM Interface -- Localities -- Control Protocol -- Random Number Generator (RNG) -- SHA-1 Engine -- RSA Engine and Key Generation -- Platform Configuration Registers (PCRs) -- Nonvolatile Storage -- Attestation Identity Key (AIK) -- TPM Ownership and Access Enforcement -- Cryptography -- Symmetric Encryption -- Asymmetric Encryption -- Cryptographic Hash Functions -- Why It Works and What It Does -- Key Concepts -- Measurements -- Secure Measurements -- Static and Dynamic Measurements -- The Intel TXT Boot Sequence -- Measured Launch Process (Secure Launch) -- Protection Against Reset Attacks -- Launch Control Policy -- Platform Configuration (PCONF). , Trusted OS Measurements (MLE Element) -- Protecting Policies -- Sealing -- Attestation -- Summary -- Chapter 3: Getting It to Work: Provisioning Intel ® TXT -- Provisioning a New Platform -- BIOS Setup -- Enable and Activate the Trusted Platform Module (TPM) -- Enable Supporting Technology -- Enabling Intel® TXT -- Summary of BIOS Setup -- Automating BIOS Provisioning -- Establish TPM Ownership -- What Is TPM Ownership ? Why Is This Important? -- How to Establish TPM Ownership -- Pass-Through TPM Model -- Remote Pass-Through TPM Model -- Management Server Model -- Protecting Authorization Values -- Install a Trusted Host Operating System -- VMware ESXi Example -- Linux Example (Ubuntu) -- Create Platform Owner's Launch Control Policy -- How It Works -- What LCP Does -- Specifying Platform Configuration: The PCONF Element -- Specifying Trusted Operating Systems: The MLE Element -- Specifying Trusted ACMs -- Specifying a Policy of "ANY" -- Revoking Platform Default Policy -- Why Is PO Policy Important? -- Prevent Interference by the Platform Supplier Policy -- Establishing Trusted Pools -- Reduce the Need for Remote Attestation -- Reset Attack Protection -- Considerations -- Summary -- Chapter 4: Foundation for Control: Establishing Launch Control Policy -- Quick Review of Launch Control Policy -- When Is Launch Control Policy Needed? -- Remote Attestation -- What Does Launch Control Policy Deliver? -- PCR0: CRTM, BIOS, and Host Platform Extensions -- PCR1: Host Platform Configuration -- PCR2, 3: Option ROM Code and Configuration Data -- PCR4, 5: IPL Code and Configuration Data -- PCR6: State Transition and Wake Events -- PCR7: Host Platform Manufacturer Control -- Platform Configuration (PCONF) Policy -- Specifying Trusted Platform Configurations -- Tools Needed for Creating a PCONF Policy -- Difficulties with Using PCONF Policy. , Specifying Trusted Host Operating Systems -- Tools Needed for Creating MLE Policy -- Options and Tradeoffs -- Impact of SINIT Updates -- Impact of Platform Configuration Change -- Impact of a BIOS Update -- Impact of OS/VMM Update -- Managing Launch Control Policy -- Think Big -- Use a Signed List -- Make Use of Vendor-Signed Policies -- Use Multiple Lists for Version Control -- Using the Simplest Policy -- Other Tips -- Strategies -- Impact of Changing TPM Ownership -- Decision Matrix -- Chapter 5: Raising Visibility for Trust: The Role of Attestation -- Attestation: What It Means -- Attestation Service Components -- Endpoint, Service, and Administrative Components -- Attestation Service Component Capabilities -- Administrative Component Capabilities -- Attestation in the Intel TXT Use Models -- Enabling the Market with Attestation -- OpenAttestation -- Mt. Wilson -- How to Get Attestation -- Chapter 6: Trusted Computing: Opportunities in Software -- What Does "Enablement" Really Mean? -- Platform Enablement: The Basics -- Platform Enablement: Extended -- Provisioning -- Updates -- Attestation -- Reporting and Logging -- Operating System and Hypervisor Enablement -- Enablement at Management and Policy Layer -- Provisioning -- Updates -- Attestation -- Reporting and Logging -- Enablement at the Security Applications Layer -- Chapter 7: Creating a More Secure Datacenter and Cloud -- When Datacenter Meets the Cloud -- The Cloud Variants -- Cloud Delivery Models -- Intel TXT Use Models and the Cloud(s) -- The Trusted Launch Model -- Trusted Compute Pools: Driving the Market -- Extended Trusted Pools: Asset Tags and Geotags -- Compliance: Changing the Landscape -- Chapter 8: The Future of Trusted Computing -- Trust Is a Foundation -- More Protections and Assurance -- Is There Enough to Trust? -- Measures at Launch Time. -- What Intel TXT Measures. , The Whitelist Approach -- The Evolution of Trust -- Trusted Guest -- End-to-End Trust -- Runtime Trust -- The Trust and Integrity "Stack" -- Index.
    Additional Edition: Print version: Futral, William Intel Trusted Execution Technology for Server Platforms Berkeley, CA : Apress L. P.,c2013 ISBN 9781430261483
    Language: English
    Keywords: Electronic books. ; Electronic books
    URL: Full-text  ((OIS Credentials Required))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Book
    Book
    Homewood, Ill. :Irwin,
    UID:
    almafu_BV007054810
    Format: VII, 175 S. mit Abb.
    Series Statement: The Irwin series in operations management.
    Language: English
    Subjects: Economics
    RVK:
    Keywords: Produktionswirtschaft ; Controlling ; Fertigungskontrolle
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Book
    Book
    Homewood, Ill. [u.a.] :Irwin [u.a.],
    UID:
    almafu_BV005976996
    Format: XV, 714 S. : , Ill., graph. Darst.
    Edition: Rev. ed.
    Series Statement: The Irwin series in management and the behavioral sciences
    Language: English
    Subjects: Economics
    RVK:
    Keywords: Lagerplanung ; Produktion ; Management
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Book
    Book
    New York [u.a.] :McGraw-Hill,
    UID:
    almafu_BV024576753
    Format: Getr. Zählung : , Ill., graph. Darst.
    Language: English
    Subjects: Economics
    RVK:
    RVK:
    Keywords: Lagerhaltung ; Produktionsplanung ; Produktion ; Management ; Produktivitätszuwachs ; Aufsatzsammlung ; Aufsatzsammlung
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    edocfu_9961095423902883
    Format: 1 online resource (59 pages) : , illustrations (chiefly color).
    Series Statement: NISTIR ; 7904
    Note: Contributed record: Metadata reviewed, not verified. Some fields updated by batch processes. , December 2015. , Title from PDF title page (viewed December 31, 2015).
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    gbv_1778675581
    Format: 1 Online-Ressource (156 p.)
    ISBN: 9781430261490
    Content: Computer science
    Note: English
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    almafu_BV023762918
    Format: Getr. Zählung : Ill., graph. Darst.
    Edition: 3. ed.
    ISBN: 0-07-024428-6
    Language: English
    Subjects: Economics
    RVK:
    RVK:
    Keywords: Lagerhaltung ; Produktionsplanung ; Produktion ; Management ; Produktivitätszuwachs ; Aufsatzsammlung ; Aufsatzsammlung
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Book
    Book
    City of Washington :Smithsonian Inst. Press,
    UID:
    almahu_BV011593275
    Format: 40 S. : Ill.
    Series Statement: Smithsonian contributions to zoology 74
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    b3kat_BV047933397
    Format: 1 Online-Ressource (56 Seiten) , 21 x 29.7cm
    Series Statement: OECD Environment Working Papers
    Content: This paper reviews the use of tax preferences to achieve environmental policy objectives. Tax preferences involve using the tax system to adjust relative prices with a view to influencing producer or consumer behaviour in favour of goods or services that are considered to be environmentally beneficial. They take various forms, typically a partial or total exemption from a specified tax. Because tax preferences help to avoid or reduce costs for businesses or consumers, there are often pressures on governments to favour them over other instruments. As a result, they are sometimes used inappropriately, typically to address negative externalities for which they are not well suited. The paper suggests that the comparative advantage of tax preferences is in providing support for positive externalities, that is situations in which a subsidy would help to deliver more social benefits than would otherwise be the case. When designing tax preferences, care must be taken to ensure that they do not encourage technological lock-in, provide perverse incentives for environmentally harmful activities (the rebound effect), or reward producers or consumers for actions they would have taken anyway. Since tax preferences are a form of subsidy, they should be subject to the same degree of scrutiny and oversight as other forms of public expenditure
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages