CDN$ 136.00
Only 1 left in stock (more on the way).
Ships from and sold by
Gift-wrap available.
Hardware-based Computer S... has been added to your Cart
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography Hardcover – Aug 25 2008

See all formats and editions Hide other formats and editions
Amazon Price New from Used from
"Please retry"
CDN$ 136.00
CDN$ 115.43 CDN$ 40.33

Product Details

  • Hardcover: 256 pages
  • Publisher: Wiley (Aug. 25 2008)
  • Language: English
  • ISBN-10: 0470193395
  • ISBN-13: 978-0470193396
  • Product Dimensions: 16.1 x 1.8 x 24.3 cm
  • Shipping Weight: 408 g
  • Average Customer Review: 4.0 out of 5 stars  See all reviews (1 customer review)
  • Amazon Bestsellers Rank: #1,187,635 in Books (See Top 100 in Books)
  • See Complete Table of Contents

Product Description


“The experienced editors have written an easily comprehended book that is international in scope, and covers the last 25 years in computer and telecommunications developments and the Web.” (CHOICE, April 2010)

From the Back Cover

Presents primary hardware-based computer security approaches in an easy-to-read toolbox format

Protecting valuable personal information against theft is a mission-critical component of today's electronic business community. In an effort to combat this serious and growing problem, the Intelligence and Defense communities have successfully employed the use of hardware-based security devices.

This book provides a road map of the hardware-based security devices that can defeat—and prevent—attacks by hackers. Beginning with an overview of the basic elements of computer security, the book covers:

  • Cryptography

  • Key generation and distribution

  • The qualities of security solutions

  • Secure co-processors

  • Secure bootstrap loading

  • Secure memory management and trusted execution technology

  • Trusted Platform Module (TPM)

  • Field Programmable Gate Arrays (FPGAs)

  • Hardware-based authentification

  • Biometrics

  • Tokens

  • Location technologies

Hardware-Based Computer Security Techniques to Defeat Hackers includes a chapter devoted entirely to showing readers how they can implement the strategies and technologies discussed. Finally, it concludes with two examples of security systems put into practice.

The information and critical analysis techniques provided in this user-friendly book are invaluable for a range of professionals, including IT personnel, computer engineers, computer security specialists, electrical engineers, software engineers, and industry analysts.

Inside This Book (Learn More)
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index | Back Cover
Search inside this book:

Customer Reviews

4.0 out of 5 stars
5 star
4 star
3 star
2 star
1 star
See the customer review
Share your thoughts with other customers

Most helpful customer reviews

By kclam on Sept. 6 2014
Format: Hardcover Verified Purchase
Hardware solutions are more robust than software-only implementation of security because the software based keys from pseudo-random generators are ultimately predicable.

Most high security implementations usually involve Trusted Platform Module (TPM) and Trusted Execution Technology (TET). TPM is a tamper-resistant and tamper-evident hardware chip on the system board that will hold computer generated keys for encryption. It can be used to authenticate the platform (your PC or laptop). TET (available on Intel's newest-generation microprocessors) relies on TPM to provide measurements of software and platform components so that system software and management applications may use those measurements to make trust decisions.

In essence, this book presents a useful introduction to the TPM, TET, hardware-based authentication (biometrics and tokens) and location control. In addition, it provides example of secure implementations in high security and low security environment. Very informative!
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again.