Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    almahu_9948197180802882
    Format: 1 online resource (xxiii, 227 pages) : , illustrations
    ISBN: 9780470425497 , 0470425490 , 9780470425473 , 0470425474 , 1281837067 , 9781281837066
    Content: The protection of critical information and systems is a major component of today's electronic business community. This valuable reference presents the primary hardware-based computer security approaches in an easy-to-read toolbox format. The technique.
    Note: The elements of computer security -- Cryptography approaches and attacks -- Key generation and distribution approaches and attacks -- The qualities of workable security solutions -- Secure coprocessors -- Secure bootstrap loading -- Secure memory management and trusted execution technology -- The trusted platform module -- Field-programmable gate arrays -- Hardware-based authentication -- A closer look at biometrics -- Tokens: something you have -- Location technologies -- Putting it all together.
    Additional Edition: Print version: Dube, Roger. Hardware-based computer security techniques to defeat hackers. Hoboken, N.J. : Wiley, ©2008 ISBN 9780470193396
    Additional Edition: ISBN 0470193395
    Language: English
    Keywords: Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages