• Menu
  • Skip to right header navigation
  • Skip to main content
  • Skip to secondary navigation
  • Skip to primary sidebar

OnlineProgrammingBooks.com

Legally Free Computer Books

  • All Categories
  • All Books
  • All Categories
  • All Books
  • About Us
  • Privacy policy
  • Disclaimer
  • Subscribe
  • Contact
You are here: Home ▶ Computer Science ▶ Platform Embedded Security Technology Revealed

Platform Embedded Security Technology Revealed

August 29, 2016

Platform Embedded Security Technology Revealed

Platform Embedded Security Technology Revealed is an in-depth introduction to Intel’s security and management engine, with details on the security features and the steps for configuring and invoking them. It’s written for security professionals and researchers; embedded-system engineers; and software engineers and vendors.

This is an ApressOpen book.

Book Description

Topics included: Cyber Security in the Mobile Age • Intel’s Embedded Solutions: from Management to Security • Building Blocks of the Security and Management Engine • The Engine: Safeguarding Itself before Safeguarding Others • Your Privacy at the Next Level with Intel’s Enhanced Privacy Identification (EPID) Technology • Boot with Integrity, or Don’t Boot • Trust Computing, Backed by Intel’s Firmware-Based TPM • Unleashing Premium Entertainment with Hardware-Based Content Protection Technology • Breaking the Boundaries with Dynamically Loaded Applications • Intel Identity Protection Technology: the Robust, Convenient, and Cost-Effective Way to Deter Identity Theft • Looking Ahead: Tomorrow’s Innovations Built on Today’s Foundation

Download Free PDF / Read Online

Author(s): Xiaoyu Ruan
Publisher: Apress
Published: August 2014
Format(s): PDF, ePub, Mobi
File size: 4.16 MB(pdf)
Number of pages: 263
Download / View Link(s): PDF, ePub, Mobi

Similar Books:

  1. Intel Trusted Execution Technology for Server Platforms
  2. Embedded, Everywhere
  3. Building the Infrastructure for Cloud Security
  4. Free eBook: Lessons from the Identity Trail
  5. Security and Privacy for Microsoft Office 2010 Users
Previous Post: « Computer Vision Metrics
Next Post: GUI Design for Android Apps »

Primary Sidebar

Get Latest Updates

  • Facebook
  • Pinterest
  • RSS
  • Twitter
  • YouTube
  • About Us
  • Privacy policy
  • Disclaimer
  • Subscribe
  • Contact

Copyright © 2006–2023 OnlineProgrammingBooks.com