Full description not available
S**R
Good book to help in understanding TPM
TPM is a difficult subject. This book helps getting the concepts clear
L**E
A Great Introduction to a Sophisticated and Timely Component in Modern Computer Systems
Trusted Platform Modules (TPMs) are becoming pervasive in computing platforms either as standalone modules or as soft TPMs running in co-processors or trusted execution environments. TPM 2.0 is a major step forward in TPM technology offering cryptographic algorithm agility, enhanced authorization, etc. This book is an excellent introduction to a very sophisticated and powerful computer device that is key to many present and future security applications. All programmers should become familiar with TPMs since security has become a key part of their job descriptions. This book will be of great benefit to them in that pursuit.
F**A
Great for both System firmware and OS/ApplicationSecurity Architects
Very helpful understanding new TPM 2.0 design and planning how to use the features. TCG jargon can be intimidating but book is careful to explain the terms and often gives history of why the term came to be used. Soon after receiving my copy I showed it to a engineer at customer site and he kept the book! What could I say? So I had to buy another...
Z**P
As a researcher and practitioner in IT Security, this ...
As a researcher and practitioner in IT Security, this books helps me a lot in understanding and using TPMin my work. It explains not only what, but why and how in a very clear manner.
U**L
Meh!
limited info
T**T
no where else will you find this info
Excellent.
L**U
It would not download to my old model Kindle
I have not seen it.
S**.
Daughter loves it!
I got this book for my daughter and she loves it.
F**O
It is a very good book. I recommend to read the book together ...
The book begins with the background to TPM, the use cases and the specifications. It then move on to practical use of TPM and make references to the interfacing software stack.It is a very good book. I recommend to read the book together with the TPM specifications and the other TPM 2.0 book by Graeme Proudler.
D**D
Very good book on theory and implementation of TPM 2.0
Very good and very technical. Maybe the overall formatting and book design could be improved, but from a technical point of view is excellent.
A**R
Muy interesante para entender de qué se trata y la historia
Leí este libro para entender para que Windows 11 pide TPM 2.0. Gracias a la lectura, descubrí que no es otra cosa más que una molestia innecesaria, como el secure boot, con la intención de apoderarse de nuestros equipos y que no podamos cambiar tan fácilmente el sistema operativo, o que recuperemos nuestra información en caso de daño físico. Además si quisiéramos usar el chip y viene Microsoft y hace cambios nos arruinaría los datos. O viceversa. Hace unos días publicaron la noticia de que TPM 2 es hackeable y no sirve. Muy buena lectura.
C**N
Informativo
Describe lo que publica la propaganda
A**N
ok
Ok
Trustpilot
1 month ago
2 months ago