Jeżeli nie znalazłeś poszukiwanej książki, skontaktuj się z nami wypełniając formularz kontaktowy.

Ta strona używa plików cookies, by ułatwić korzystanie z serwisu. Mogą Państwo określić warunki przechowywania lub dostępu do plików cookies w swojej przeglądarce zgodnie z polityką prywatności.

Wydawcy

Literatura do programów

Informacje szczegółowe o książce

Hardware–based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography - ISBN 9780470193396

Hardware–based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography

ISBN 9780470193396

Autor: Roger R. Dube

Wydawca: Wiley

Dostępność: 3-6 tygodni

Cena: 597,45 zł

Przed złożeniem zamówienia prosimy o kontakt mailowy celem potwierdzenia ceny.


ISBN13:      

9780470193396

ISBN10:      

0470193395

Autor:      

Roger R. Dube

Oprawa:      

Hardback

Rok Wydania:      

2008-09-12

Ilość stron:      

256

Wymiary:      

239x165

Tematy:      

TJ

Presents primary hardware–based computer security approaches in an easy–to–read toolbox format
Protecting valuable personal information against theft is a mission–critical component of today′s electronic business community. In an effort to combat this serious and growing problem, the Intelligence and Defense communities have successfully employed the use of hardware–based security devices.
This book provides a road map of the hardware–based security devices that can defeat—and prevent—attacks by hackers. Beginning with an overview of the basic elements of computer security, the book covers:
Cryptography
Key generation and distribution
The qualities of security solutions
Secure co–processors
Secure bootstrap loading
Secure memory management and trusted execution technology
Trusted Platform Module (TPM)
Field Programmable Gate Arrays (FPGAs)
Hardware–based authentification
Biometrics
Tokens
Location technologies
Hardware–Based Computer Security Techniques to Defeat Hackers includes a chapter devoted entirely to showing readers how they can implement the strategies and technologies discussed. Finally, it concludes with two examples of security systems put into practice.
The information and critical analysis techniques provided in this user–friendly book are invaluable for a range of professionals, including IT personnel, computer engineers, computer security specialists, electrical engineers, software engineers, and industry analysts.

Spis treści:
1. The Elements of Computer Security.
2. Cryptography Approaches and Attacks.
3. Key Generation and Distribution Approaches and Attacks.
4. The Qualities of Workable Security Solutions.
5. Secure Coprocessors.
6. Secure bootstrap Loading.
7. Secure Memory Management and Trusted Execution Technology.
8. The Trusted Platform Module.
9. Field–Programmable Gate Arrays.
10. Hardware–Based Authentication.
11. A Closer Look At Biometrics.
12. Tokens: Something You Have.
13. Location Technologies.
14. Putting It All Together.
Glossary.
Index.

Nota biograficzna:
Roger R. Dube, PhD, obtained his bachelor′s degree in experimental physics from Cornell University and his PhD from Princeton University. He has held positions in both academia and the private sector. He has published in top peer–reviewed scientific publications and written numerous successful research and development proposals (securing in excess of $27 million in grants and contract vehicles since 2004). He is currently the President and Chief Scientist of Digital Authentication Technologies (DAT), a computer security company with products based on Dr. Dube′s patents. The technology has been successfully field–tested and deployed at the U.S. Joint Forces Command in Norfolk, Virginia, as well as at SAIC and Criterion Labs, and is currently being considered for use by various industries worldwide. Dr. Dube also holds a joint position at Rochester Institute of Techology (RIT) as a Professor in the Center for Imaging Science.

Okładka tylna:
Presents primary hardware–based computer security approaches in an easy–to–read toolbox format
Protecting valuable personal information against theft is a mission–critical component of today′s electronic business community. In an effort to combat this serious and growing problem, the Intelligence and Defense communities have successfully employed the use of hardware–based security devices.
This book provides a road map of the hardware–based security devices that can defeat—and prevent—attacks by hackers. Beginning with an overview of the basic elements of computer security, the book covers:
Cryptogr aphy
Key generation and distribution
The qualities of security solutions
Secure co–processors
Secure bootstrap loading
Secure memory management and trusted execution technology
Trusted Platform Module (TPM)
Field Programmable Gate Arrays (FPGAs)
Hardware–based authentification
Biometrics
Tokens
Location technologies
Hardware–Based Computer Security Techniques to Defeat Hackers includes a chapter devoted entirely to showing readers how they can implement the strategies and technologies discussed. Finally, it concludes with two examples of security systems put into practice.
The information and critical analysis techniques provided in this user–friendly book are invaluable for a range of professionals, including IT personnel, computer engineers, computer security specialists, electrical engineers, software engineers, and industry analysts.

Koszyk

Książek w koszyku: 0 szt.

Wartość zakupów: 0,00 zł

ebooks
covid

Kontakt

Gambit
Centrum Oprogramowania
i Szkoleń Sp. z o.o.

Al. Pokoju 29b/22-24

31-564 Kraków


Siedziba Księgarni

ul. Kordylewskiego 1

31-542 Kraków

+48 12 410 5991

+48 12 410 5987

+48 12 410 5989

Zobacz na mapie google

Wyślij e-mail

Subskrypcje

Administratorem danych osobowych jest firma Gambit COiS Sp. z o.o. Na podany adres będzie wysyłany wyłącznie biuletyn informacyjny.

Autoryzacja płatności

PayU

Informacje na temat autoryzacji płatności poprzez PayU.

PayU banki

© Copyright 2012: GAMBIT COiS Sp. z o.o. Wszelkie prawa zastrzeżone.

Projekt i wykonanie: Alchemia Studio Reklamy