Bootstrapping Trust in Modern Computers
Series: SpringerBriefs in Computer Science;
- Publisher's listprice EUR 53.49
-
22 184 Ft (21 128 Ft + 5% VAT)
The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.
- Discount 20% (cc. 4 437 Ft off)
- Discounted price 17 748 Ft (16 902 Ft + 5% VAT)
Subcribe now and take benefit of a favourable price.
Subscribe
22 184 Ft
Availability
printed on demand
Why don't you give exact delivery time?
Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.
Product details:
- Edition number 2011
- Publisher Springer New York
- Date of Publication 30 August 2011
- Number of Volumes 1 pieces, Book
- ISBN 9781461414599
- Binding Paperback
- No. of pages101 pages
- Size 235x155 mm
- Weight 454 g
- Language English
- Illustrations IX, 101 p. 10 illus. Illustrations, black & white 0
Categories
Long description:
"Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer's state. We examine research on securely capturing a computer's state, and consider the utility of this information both for improving security on the local computer (e.g., to convince the user that her computer is not infected with malware) and for communicating a remote computer's state (e.g., to enable the user to check that a web server will adequately protect her data). Although the recent ""Trusted Computing"" initiative has drawn both positive and negative attention to this area, we consider the older and broader topic of bootstrapping trust in a computer. We cover issues ranging from the wide collection of secure hardware that can serve as a foundation for trust, to the usability issues that arise when trying to convey computer state information to humans. This approach unifies disparate research efforts and highlights opportunities for additional work that can guide real-world improvements in computer security."
More
Geometric Analysis and Computer Graphics: Proceedings of a Workshop held May 23-25, 1988
35 481 HUF
32 643 HUF
Principles of Adaptive Optics, Third Edition
33 915 HUF
30 524 HUF