当前位置: 首页 > 资源下载 > 网络通信安全 > 查看资源

资源分类
Web开发
Java
.NET
编程语言
数据库
软件工程
图形动画
系统管理
网络通信安全
计算机理论
考试认证
人文百科
文档手册
硬件技术
办公软件

Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics t

Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics t

书名:Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics t

上传:石头

时间:2009-12-26

文件大小:10.52 MB

资源出处:查看资源出处 >>

收藏到网摘: n/a



作者:Roger R. Dube
出版日期:August 25, 2008
出版社:Wiley Publishing
页数:256
ISBN:ISBN-10: 0470193395 ISBN-13: 978-0470193396
文件格式:PDF

Product Description
The protection of critical information and systems is a major componentof today’s electronic business community. This valuable referencepresents the primary hardware-based computer security approaches in aneasy-to-read toolbox format. The techniques discussed show readers howto perform their own evaluation of new and emerging securitytechnologies. It is an invaluable source for computer engineers,computer security specialists, electrical engineers, softwareengineers, IT professionals, and advanced undergraduate and graduatestudents in computer engineering and computer science.
From the Back Cover
Presents primary hardware-based computer security approaches in an easy-to-read toolbox format
Protecting valuable personal information against theft is amission-critical component of today’s electronic business community. Inan effort to combat this serious and growing problem, the Intelligenceand Defense communities have successfully employed the use ofhardware-based security devices.
This book provides a road map of the hardware-based security devicesthat can defeat—and prevent—attacks by hackers. Beginning with anoverview of the basic elements of computer security, the book covers:
CryptographyKey generation and distributionThe qualities of security solutionsSecure co-processorsSecure bootstrap loadingSecure memory management and trusted execution technologyTrusted Platform Module (TPM)Field Programmable Gate Arrays (FPGAs)Hardware-based authentificationBiometricsTokensLocation technologiesHardware-Based Computer Security Techniques to Defeat Hackersincludes a chapter devoted entirely to showing readers how they canimplement the strategies and technologies discussed. Finally, itconcludes with two examples of security systems put into practice.
The information and critical analysis techniques provided in thisuser-friendly book are invaluable for a range of professionals,including IT personnel, computer engineers, computer securityspecialists, electrical engineers, software engineers, and industryanalysts.
Tags:BiometricsComputerCryptographyDefeatQuantum


大家都在看什么书

  • Cryptography in C and C++, Second Edition
  • Cryptography in C and C++, Second Edition
  • Pro Spring 2.5 (PDF 英文版)
  • Integrating and Extending BIRT, 2nd Second Edition (PDF英文版)
  • Beginning ASP.NET E-Commerce in C#: From Novice to Professional

评论 (0) All

登陆 | 还没注册?