作者:Roger R. Dube
出版日期:August 25, 2008
出版社:Wiley Publishing
页数:256
ISBN:ISBN-10: 0470193395 ISBN-13: 978-0470193396
文件格式:PDF
Product Description
The protection of critical information and systems is a major componentof today’s electronic business community. This valuable referencepresents the primary hardware-based computer security approaches in aneasy-to-read toolbox format. The techniques discussed show readers howto perform their own evaluation of new and emerging securitytechnologies. It is an invaluable source for computer engineers,computer security specialists, electrical engineers, softwareengineers, IT professionals, and advanced undergraduate and graduatestudents in computer engineering and computer science.
From the Back Cover
Presents primary hardware-based computer security approaches in an easy-to-read toolbox format
Protecting valuable personal information against theft is amission-critical component of today’s electronic business community. Inan effort to combat this serious and growing problem, the Intelligenceand Defense communities have successfully employed the use ofhardware-based security devices.
This book provides a road map of the hardware-based security devicesthat can defeat—and prevent—attacks by hackers. Beginning with anoverview of the basic elements of computer security, the book covers:
CryptographyKey generation and distributionThe qualities of security solutionsSecure co-processorsSecure bootstrap loadingSecure memory management and trusted execution technologyTrusted Platform Module (TPM)Field Programmable Gate Arrays (FPGAs)Hardware-based authentificationBiometricsTokensLocation technologiesHardware-Based Computer Security Techniques to Defeat Hackersincludes a chapter devoted entirely to showing readers how they canimplement the strategies and technologies discussed. Finally, itconcludes with two examples of security systems put into practice.
The information and critical analysis techniques provided in thisuser-friendly book are invaluable for a range of professionals,including IT personnel, computer engineers, computer securityspecialists, electrical engineers, software engineers, and industryanalysts.