Become a Readings Member to make your shopping experience even easier. Sign in or sign up for free!

Become a Readings Member. Sign in or sign up for free!

Hello Readings Member! Go to the member centre to view your orders, change your details, or view your lists, or sign out.

Hello Readings Member! Go to the member centre or sign out.

Hardware-based Computer Security: From Biometrics to Quantum Cryptography
Hardback

Hardware-based Computer Security: From Biometrics to Quantum Cryptography

$457.99
Sign in or become a Readings Member to add this title to your wishlist.

Presents primary hardware-based computer security approaches in an easy-to-read toolbox format Protecting valuable personal information against theft is a mission-critical component of today’s electronic business community. In an effort to combat this serious and growing problem, the Intelligence and Defense communities have successfully employed the use of hardware-based security devices. This book provides a road map of the hardware-based security devices that can defeat-and prevent-attacks by hackers. Beginning with an overview of the basic elements of computer security, the book covers:* Cryptography* Key generation and distribution* The qualities of security solutions* Secure co-processors* Secure bootstrap loading* Secure memory management and trusted execution technology* Trusted Platform Module (TPM)* Field Programmable Gate Arrays (FPGAs)* Hardware-based authentification* Biometrics* Tokens* Location technologies Hardware-Based Computer Security Techniques to Defeat Hackers includes a chapter devoted entirely to showing readers how they can implement the strategies and technologies discussed. Finally, it concludes with two examples of security systems put into practice. The information and critical analysis techniques provided in this user-friendly book are invaluable for a range of professionals, including IT personnel, computer engineers, computer security specialists, electrical engineers, software engineers, and industry analysts.

Read More
In Shop
Out of stock
Shipping & Delivery

$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout

MORE INFO
Format
Hardback
Publisher
John Wiley and Sons Ltd
Country
United States
Date
25 August 2008
Pages
256
ISBN
9780470193396

Presents primary hardware-based computer security approaches in an easy-to-read toolbox format Protecting valuable personal information against theft is a mission-critical component of today’s electronic business community. In an effort to combat this serious and growing problem, the Intelligence and Defense communities have successfully employed the use of hardware-based security devices. This book provides a road map of the hardware-based security devices that can defeat-and prevent-attacks by hackers. Beginning with an overview of the basic elements of computer security, the book covers:* Cryptography* Key generation and distribution* The qualities of security solutions* Secure co-processors* Secure bootstrap loading* Secure memory management and trusted execution technology* Trusted Platform Module (TPM)* Field Programmable Gate Arrays (FPGAs)* Hardware-based authentification* Biometrics* Tokens* Location technologies Hardware-Based Computer Security Techniques to Defeat Hackers includes a chapter devoted entirely to showing readers how they can implement the strategies and technologies discussed. Finally, it concludes with two examples of security systems put into practice. The information and critical analysis techniques provided in this user-friendly book are invaluable for a range of professionals, including IT personnel, computer engineers, computer security specialists, electrical engineers, software engineers, and industry analysts.

Read More
Format
Hardback
Publisher
John Wiley and Sons Ltd
Country
United States
Date
25 August 2008
Pages
256
ISBN
9780470193396