Only 1 left in stock (more on the way).
Ships from and sold by Amazon.ca. Gift-wrap available.
Quantity:1
Hardware-based Computer S... has been added to your Cart
+ CDN$ 6.49 shipping
Used: Very Good | Details
Sold by Paragon OS3
Condition: Used: Very Good
Comment: Book in english. Please feel free to e-mail us if you have any question. Livre en anglais. N'hésitez pas à nous contacter si vous avez la moindre question.
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 2 images

Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography Hardcover – Aug 25 2008

4.0 out of 5 stars 1 customer review

See all formats and editions Hide other formats and editions
Amazon Price
New from Used from
Hardcover
"Please retry"
CDN$ 154.00
CDN$ 105.54 CDN$ 79.15

Harry Potter and the Cursed Child
click to open popover

No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.
Getting the download link through email is temporarily not available. Please check back later.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your mobile phone number.




Product Details

  • Hardcover: 256 pages
  • Publisher: Wiley (Aug. 25 2008)
  • Language: English
  • ISBN-10: 0470193395
  • ISBN-13: 978-0470193396
  • Product Dimensions: 16.1 x 1.8 x 24.3 cm
  • Shipping Weight: 408 g
  • Average Customer Review: 4.0 out of 5 stars 1 customer review
  • Amazon Bestsellers Rank: #2,077,204 in Books (See Top 100 in Books)
  •  Would you like to update product info, give feedback on images, or tell us about a lower price?

  • See Complete Table of Contents

Product Description

Review

“The experienced editors have written an easily comprehended book that is international in scope, and covers the last 25 years in computer and telecommunications developments and the Web.” (CHOICE, April 2010)

From the Back Cover

Presents primary hardware-based computer security approaches in an easy-to-read toolbox format

Protecting valuable personal information against theft is a mission-critical component of today's electronic business community. In an effort to combat this serious and growing problem, the Intelligence and Defense communities have successfully employed the use of hardware-based security devices.

This book provides a road map of the hardware-based security devices that can defeat—and prevent—attacks by hackers. Beginning with an overview of the basic elements of computer security, the book covers:

  • Cryptography

  • Key generation and distribution

  • The qualities of security solutions

  • Secure co-processors

  • Secure bootstrap loading

  • Secure memory management and trusted execution technology

  • Trusted Platform Module (TPM)

  • Field Programmable Gate Arrays (FPGAs)

  • Hardware-based authentification

  • Biometrics

  • Tokens

  • Location technologies

Hardware-Based Computer Security Techniques to Defeat Hackers includes a chapter devoted entirely to showing readers how they can implement the strategies and technologies discussed. Finally, it concludes with two examples of security systems put into practice.

The information and critical analysis techniques provided in this user-friendly book are invaluable for a range of professionals, including IT personnel, computer engineers, computer security specialists, electrical engineers, software engineers, and industry analysts.

See all Product Description

Customer Reviews

4.0 out of 5 stars
5 star
0
4 star
1
3 star
0
2 star
0
1 star
0
See the customer review
Share your thoughts with other customers

Top Customer Reviews

Format: Hardcover Verified Purchase
Hardware solutions are more robust than software-only implementation of security because the software based keys from pseudo-random generators are ultimately predicable.

Most high security implementations usually involve Trusted Platform Module (TPM) and Trusted Execution Technology (TET). TPM is a tamper-resistant and tamper-evident hardware chip on the system board that will hold computer generated keys for encryption. It can be used to authenticate the platform (your PC or laptop). TET (available on Intel's newest-generation microprocessors) relies on TPM to provide measurements of software and platform components so that system software and management applications may use those measurements to make trust decisions.

In essence, this book presents a useful introduction to the TPM, TET, hardware-based authentication (biometrics and tokens) and location control. In addition, it provides example of secure implementations in high security and low security environment. Very informative!
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again.
Report abuse


Feedback