Hardware-based computer security techniques to defeat hackers: from biometrics to quantum cryptography

Hardware-based computer security techniques to defeat hackers: from biometrics to quantum cryptography

Dube, Roger R.

90,77 €(IVA inc.)

The protection of critical information and systems is a major component of today's electronic business community. This valuable reference presents the primary hardware-based computer security approaches in an easy-to-read toolbox format. The techniques discussed show readers how to perform their own evaluationof new and emerging security technologies. It is an invaluable source for computer engineers, computer security specialists, electrical engineers, softwareengineers, IT professionals, and advanced undergraduate and graduate studentsin computer engineering and computer science. INDICE: Chapter 1: The Elements of Computer Security. Chapter 2: Cryptography - Approaches and Attacks. Chapter 3: Key Generation and Distribution - Approaches and Attacks. Chapter 4: What is Needed - The Qualities of Security Solutions that will Work. Chapter 6: Secure Bootstrap Loading. Chapter 7: Secure Memory Management and Trusted Execution Technology (LaGrande). Chapter 8: Trusted Platform Module (TPM). Chapter 9: Field Programmable Gate Arrays (FPGAs). Chapter 10: Hardware Based Authentication. Chapter 11: A Closer Look at Biometrics. Chapter 12: Tokens - Something You Have. Chapter 13: Location Technologies. Chapter 14: Putting It All Together. Concluding Remarks.

  • ISBN: 978-0-470-19339-6
  • Editorial: John Wiley & Sons
  • Encuadernacion: Cartoné
  • Páginas: 264
  • Fecha Publicación: 01/08/2008
  • Nº Volúmenes: 1
  • Idioma: Inglés