Platform Embedded Security Technology Revealed is an in-depth introduction to Intel s platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects applications secrets and users privacy in a secure, light-weight, and inexpensive way. Besides native built-in features, it allows third-party software vendors to develop applications that take advantage of the security infrastructures offered by the…mehr
Platform Embedded Security Technology Revealed is an in-depth introduction to Intel s platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects applications secrets and users privacy in a secure, light-weight, and inexpensive way. Besides native built-in features, it allows third-party software vendors to develop applications that take advantage of the security infrastructures offered by the engine.
Intel s security and management engine is technologically unique and significant, but is largely unknown to many members of the tech communities who could potentially benefit from it. Platform Embedded Security Technology Revealed reveals technical details of the engine. The engine provides a new way for the computer security industry to resolve critical problems resulting frombooming mobile technologies, such as increasing threats against confidentiality and privacy. This book describes how this advanced level of protection is made possible by the engine, how it can improve users security experience, and how third-party vendors can make use of it.
It's written for computer security professionals and researchers; embedded system engineers; and software engineers and vendors who are interested in developing new security applications on top of Intel s security and management engine.
It s also written for advanced users who are interested in understanding how the security features of Intel s platforms work.
Artikelnr. des Verlages: 86359248, 978-1-4302-6571-9
1st ed.
Seitenzahl: 272
Erscheinungstermin: 9. August 2014
Englisch
Abmessung: 229mm x 152mm x 15mm
Gewicht: 398g
ISBN-13: 9781430265719
ISBN-10: 143026571X
Artikelnr.: 40151002
Herstellerkennzeichnung
Books on Demand GmbH
In de Tarpen 42
22848 Norderstedt
info@bod.de
040 53433511
Autorenporträt
Xiaoyu Ruan is an expert in cryptography and computer security. Xiaoyu currently serves as a staff engineer and security research with the chipset and software IP group (CSG) of Intel Corporation. In this position, he is responsible for architecting and designing security features and applications, such as digital right management (DRM), of the security and management engine for Intel's chipset products, which are embedded in PCs, servers, tablets, and smartphones. Before joining Intel, Xiaoyu was as a principal security engineer with Corsec Security, where he helped hardware and software vendors design cryptography and security modules and obtain FIPS 140 compliance certificates from NIST. Xiaoyu obtained his Ph.D. and M.S. degrees in computer engineering from the North Dakota State University, and B.S. degree in electrical engineering from Fudan University of China. He is an author of 15 peer-reviewed journal and conference papers in the areas of cryptography, security, and information theory.
Inhaltsangabe
1. Cyber Security in the Mobile Age 2. Intel’s Embedded Solutions: from Management to Security 3. Building Blocks of the Security and Management Engine 4. The Engine: Safeguarding Itself before Safeguarding Others 5. Your Privacy at the Next Level with Intel's Enhanced Privacy Identification (EPID) Technology 6. Boot with Integrity, or Don’t Boot 7. Trust Computing, Backed by Intel's Firmware-Based TPM 8. Unleashing Premium Entertainment with Hardware-Based Content Protection Technology 9. Breaking the Boundaries with Dynamically Loaded Applications 10. Intel Identity Protection Technology: the Robust, Convenient, and Cost-Effective Way to Deter Identity Theft 11. Looking Ahead: Tomorrow's Innovations Built on Today's Foundation
1. Cyber Security in the Mobile Age 2. Intel’s Embedded Solutions: from Management to Security 3. Building Blocks of the Security and Management Engine 4. The Engine: Safeguarding Itself before Safeguarding Others 5. Your Privacy at the Next Level with Intel's Enhanced Privacy Identification (EPID) Technology 6. Boot with Integrity, or Don’t Boot 7. Trust Computing, Backed by Intel's Firmware-Based TPM 8. Unleashing Premium Entertainment with Hardware-Based Content Protection Technology 9. Breaking the Boundaries with Dynamically Loaded Applications 10. Intel Identity Protection Technology: the Robust, Convenient, and Cost-Effective Way to Deter Identity Theft 11. Looking Ahead: Tomorrow's Innovations Built on Today's Foundation
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826