ShopSpell

Trusted Platform Module Basics Using TPM in Embedded Systems [Paperback]

$100.99       (Free Shipping)
70 available
  • Category: Books (Technology & Engineering)
  • Author:  Steven L. Kinney
  • Author:  Steven L. Kinney
  • ISBN-10:  0750679603
  • ISBN-10:  0750679603
  • ISBN-13:  9780750679602
  • ISBN-13:  9780750679602
  • Publisher:  Newnes
  • Publisher:  Newnes
  • Pages:  368
  • Pages:  368
  • Binding:  Paperback
  • Binding:  Paperback
  • Pub Date:  01-Apr-2006
  • Pub Date:  01-Apr-2006
  • SKU:  0750679603-11-MPOD
  • SKU:  0750679603-11-MPOD
  • Item ID: 100930698
  • Seller: ShopSpell
  • Ships in: 2 business days
  • Transit time: Up to 5 business days
  • Delivery by: Dec 26 to Dec 28
  • Notes: Brand New Book. Order Now.
  • Clear, practical tutorial style text with real-world applications
  • First book on TPM for embedded designers
  • Provides a sound foundation on the TPM, helping designers take advantage of hardware security based on sound TCG standards
  • Covers all the TPM basics, discussing in detail the TPM Key Hierarchy and the Trusted Platform Module specification
  • Presents a methodology to enable designers and developers to successfully integrate the TPM into an embedded design and verify the TPM's operation on a specific platform


  • This sound foundation on the TPM provides clear, practical tutorials with detailed real-world application examples
  • The author is reknowned for training embedded systems developers to successfully implement the TPM worldwide
Chapter 1: History of the Trusted Computing Group
Chapter 2: Cryptographic Basics
Chapter 3: Software vs. Hardware Based Security Models
Chapter 4: Hardware Design Considerations
Chapter 5: TPM Architectural Overview
Chapter 6: Root of Trust, the TPM Endorsement Key
Chapter 7: Key Hierarchy and Management
Chapter 8: Platform Configuration Registers
Chapter 9: TPM Command Message Overview
Chapter 10: TPM Intra Message Structures
Chapter 11: Anti-Replay Protection and Rolling Nonces
Chapter 12: Command Authorization
Chapter 13: Communicating with the TPM, Intel's Low Pin Count (LPC) Bus
Chapter 14: TPM LPC Base Address Definitions and Functionality
Chapter 15: TPM Sacred Seven Command Suite
Chapter 16: Compliance Vectors and Their Purpose
Chapter 17: TPM System Deployment Initialization
Chapter 18: Establishing a TPM Owner and Owner Authorized Command Suite
Chapter 19: TPM CryptoglÃØ
Add Review