BASIC APPROACH PLEASE PROVIDE COURSE INFORMATION
TCPA: Building computing platforms upon a solid foundation of trust.
As businesses stake their very existence on the Internet, PCs, PDAs, and other key computing platforms, the trustworthiness of these platforms has become a vital concern. In response, the Trusted Computing Platform Alliance (TCPA) has delivered a complete specification for building trusted computing platforms atop trusted hardware. In Trusted Computing Platforms, leaders of the initiative illuminate TCPA for every systems developer and decision-maker. They place TCPA in context, outlining its goals, techniques, and powerful implications for the future.
- What trusted computing platforms are, how they work, and what problems they will solve
- Transforming standard platforms into trusted platforms cost-effectively
- Scenarios for managers: TCPA applications in the security-focused business
- Protected storage: how TCPA can ensure the confidentiality of stored data
- Software integrity: ensuring that a system's software environment hasn't been tampered with
- Trust mechanisms in a trusted platform: functional descriptions, advantages, and overhead
- Trusted platforms in practice: TCPA for developers and technical professionals
- How trusted platforms can be used to protect user privacy
- The TCPA initiative: its history, status, and next steps forward
Backed by an extraordinary range of industry leaders, TCPA offers the first complete, cost-effective, and globally applicable solution for trusted computing. Whether you develop new systems or apply them in business or government, you need to understand this technology-and with this book, you will.