UID:
almafu_9959327341802883
Format:
1 online resource (xxiii, 227 pages) :
,
illustrations
ISBN:
9780470425497
,
0470425490
,
9780470425473
,
0470425474
,
1281837067
,
9781281837066
Content:
The protection of critical information and systems is a major component of today's electronic business community. This valuable reference presents the primary hardware-based computer security approaches in an easy-to-read toolbox format. The technique.
Note:
The elements of computer security -- Cryptography approaches and attacks -- Key generation and distribution approaches and attacks -- The qualities of workable security solutions -- Secure coprocessors -- Secure bootstrap loading -- Secure memory management and trusted execution technology -- The trusted platform module -- Field-programmable gate arrays -- Hardware-based authentication -- A closer look at biometrics -- Tokens: something you have -- Location technologies -- Putting it all together.
Additional Edition:
Print version: Dube, Roger. Hardware-based computer security techniques to defeat hackers. Hoboken, N.J. : Wiley, ©2008 ISBN 9780470193396
Additional Edition:
ISBN 0470193395
Language:
English
Keywords:
Electronic books.
;
Electronic books.
DOI:
10.1002/9780470425497
URL:
https://onlinelibrary.wiley.com/doi/book/10.1002/9780470425497
URL:
https://onlinelibrary.wiley.com/doi/book/10.1002/9780470425497