找回密码
 注册
搜索
热搜: java php web
查看: 552|回复: 4

Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics t

[复制链接]
发表于 2009-12-26 10:03:42 | 显示全部楼层 |阅读模式
本帖最后由 石头 于 2009-12-26 10:05 编辑



作者:Roger R. Dube
出版日期:August 25, 2008
出版社:Wiley Publishing
页数:256
ISBN:ISBN-10: 0470193395 ISBN-13: 978-0470193396
文件格式:PDF

Product Description
The protection of critical information and systems is a major componentof today’s electronic business community. This valuable referencepresents the primary hardware-based computer security approaches in aneasy-to-read toolbox format. The techniques discussed show readers howto perform their own evaluation of new and emerging securitytechnologies. It is an invaluable source for computer engineers,computer security specialists, electrical engineers, softwareengineers, IT professionals, and advanced undergraduate and graduatestudents in computer engineering and computer science.
From the Back Cover
Presents primary hardware-based computer security approaches in an easy-to-read toolbox format
Protecting valuable personal information against theft is amission-critical component of today’s electronic business community. Inan effort to combat this serious and growing problem, the Intelligenceand Defense communities have successfully employed the use ofhardware-based security devices.
This book provides a road map of the hardware-based security devicesthat can defeat—and prevent—attacks by hackers. Beginning with anoverview of the basic elements of computer security, the book covers:
  • Cryptography
  • Key generation and distribution
  • The qualities of security solutions
  • Secure co-processors
  • Secure bootstrap loading
  • Secure memory management and trusted execution technology
  • Trusted Platform Module (TPM)
  • Field Programmable Gate Arrays (FPGAs)
  • Hardware-based authentification
  • Biometrics
  • Tokens
  • Location technologies
Hardware-Based Computer Security Techniques to Defeat Hackersincludes a chapter devoted entirely to showing readers how they canimplement the strategies and technologies discussed. Finally, itconcludes with two examples of security systems put into practice.
The information and critical analysis techniques provided in thisuser-friendly book are invaluable for a range of professionals,including IT personnel, computer engineers, computer securityspecialists, electrical engineers, software engineers, and industryanalysts.

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有账号?注册

×
发表于 2010-1-4 21:16:00 | 显示全部楼层
谢谢分享,我收了

评分

1

查看全部评分

回复

使用道具 举报

发表于 2010-5-13 01:30:29 | 显示全部楼层
谢谢分享,我收了
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 注册

本版积分规则

Archiver|手机版|小黑屋|软晨网(RuanChen.com)

GMT+8, 2024-11-22 19:46

Powered by Discuz! X3.5

Copyright © 2001-2023 Tencent Cloud.

快速回复 返回顶部 返回列表