• Contact

  • Newsletter

  • About us

  • Delivery options

  • Prospero Book Market Podcast

  • News

  • Trusted Platform Module Basics: Using TPM in Embedded Systems

    Trusted Platform Module Basics by Kinney, Steven L.;

    Using TPM in Embedded Systems

    Series: Embedded Technology;

      • GET 20% OFF

      • The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
      • Publisher's listprice EUR 68.95
      • The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.

        29 248 Ft (27 855 Ft + 5% VAT)
      • Discount 20% (cc. 5 850 Ft off)
      • Discounted price 23 398 Ft (22 284 Ft + 5% VAT)

    29 248 Ft

    db

    Availability

    printed on demand

    Why don't you give exact delivery time?

    Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.

    Short description:

    Intended for embedded designers, this book provides a foundation on the TPM, helping designers take advantage of hardware security based on sound TCG standards. It covers the TPM basics, discussing the TPM Key Hierarchy and the Trusted Platform Module specification. It also includes an accompanying CD-ROM that contains source code.

    More

    Long description:

    • Clear, practical tutorial style text with real-world applications
    • First book on TPM for embedded designers
    • Provides a sound foundation on the TPM, helping designers take advantage of hardware security based on sound TCG standards
    • Covers all the TPM basics, discussing in detail the TPM Key Hierarchy and the Trusted Platform Module specification
    • Presents a methodology to enable designers and developers to successfully integrate the TPM into an embedded design and verify the TPM's operation on a specific platform

    More

    Table of Contents:

    Chapter 1: History of the Trusted Computing Group Chapter 2: Cryptographic BasicsChapter 3: Software vs. Hardware Based Security Models Chapter 4: Hardware Design ConsiderationsChapter 5: TPM Architectural OverviewChapter 6: Root of Trust, the TPM Endorsement KeyChapter 7: Key Hierarchy and ManagementChapter 8: Platform Configuration RegistersChapter 9: TPM Command Message OverviewChapter 10: TPM Intra Message StructuresChapter 11: Anti-Replay Protection and Rolling Nonces Chapter 12: Command AuthorizationChapter 13: Communicating with the TPM, Intel's Low Pin Count (LPC) BusChapter 14: TPM LPC Base Address Definitions and FunctionalityChapter 15: TPM Sacred Seven Command SuiteChapter 16: Compliance Vectors and Their PurposeChapter 17: TPM System Deployment Initialization Chapter 18: Establishing a TPM Owner and Owner Authorized Command SuiteChapter 19: TPM Cryptographic Command Suite Chapter 20: TPM PCR Command Suite Chapter 21: TPM Protection Profile Chapter 22: Trusted Device Driver Chapter 23: Trusted Device Driver Layer and Interface Chapter 24: Sequential Command Examples Chapter 25: Migrating to the 1.2 Version of the TPMAPPENDIX A: TPM Command List by OrdinalAPPENDIX B: TPM Error List by Return Code APPENDIX C: SMBus, An Alternate Communication ModelAPPENDIX D: Compliance Test Suite Source Code, C Source

    More