A Practical Guide to Trusted Computing

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

I think this book may be useful for people more familiar with the subject.I hoped to understand TPM command to encrypt/decrypt the data/key but find the book hard to read. There are several examples in C but those are evasive and leave me with more questions and doubt. I gave up after several chaptersTo be fair, I attempted to read TCG specs (and there are so many!) as well and those were equally confusing to me and it is difficult to satisfy all aspects of TPM. I have more understanding of TPM after reading several chapters but my original questions remained unanswered.

Author(s): David Challener, Kent Yoder, Ryan Catherman, David Safford, Leendert Van Doorn
Edition: 1
Publisher: IBM Press
Year: 2008

Language: English
Pages: 376