Explore: Trusted Computing
Discover books, insights, and more — all in one place.
Learn more about Trusted Computing with top reads curated from trusted sources — all in one place.
AI-Generated Overview About “trusted-computing”:
Books Results
Source: The Open Library
The Open Library Search Results
Search results from The Open Library
1Hacking the Xbox
An Introduction to Reverse Engineering
By Andrew "Bunnie" Huang

“Hacking the Xbox” Metadata:
- Title: Hacking the Xbox
- Author: Andrew "Bunnie" Huang
- Language: English
- Number of Pages: Median: 288
- Publisher: ➤ Tandem Library - Xenatera Press - No Starch Press
- Publish Date: 2003
“Hacking the Xbox” Subjects and Themes:
- Subjects: ➤ Reverse engineering - Computer hackers - Computer security - Trusted computing - DRM - DMCA - Security research - Hackers - xbox - hardware - reverse - hacking - power - rom - security - soldering - solder - engineering - reverse engineering - power supply - flash rom - soldering iron - circuit board - front panel - xbox security - hard drive - boot rom - xbox motherboard
Edition Identifiers:
- The Open Library ID: OL9690551M - OL8581092M - OL8871395M
- Online Computer Library Center (OCLC) ID: 52471476 - 54613988
- Library of Congress Control Number (LCCN): 2003013303
- All ISBNs: ➤ 1593270291 - 9780613920391 - 0974057509 - 9780974057507 - 0613920392 - 9781593270292
First Setence:
"Hardware hacking may seem daunting at first because of the sophisticated tools that are required for some projects."
Author's Alternative Names:
"Andrew Huang"Access and General Info:
- First Year Published: 2003
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Hacking the Xbox at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
2Trusted Platform Modules
By Ariel Segall
“Trusted Platform Modules” Metadata:
- Title: Trusted Platform Modules
- Author: Ariel Segall
- Language: English
- Publisher: ➤ Institution of Engineering & Technology
- Publish Date: 2015 - 2016
“Trusted Platform Modules” Subjects and Themes:
- Subjects: ➤ Computer security - Computer networks - Security measures - Computer Security - Sécurité informatique - Réseaux d'ordinateurs - Sécurité - Mesures - COMPUTERS - Security - General - Authorisation - Programming - Trusted computing
Edition Identifiers:
- The Open Library ID: OL37202480M - OL35794712M
- Online Computer Library Center (OCLC) ID: 966613557
- All ISBNs: 1849198934 - 9781849198943 - 9781849198936 - 1849198942
Access and General Info:
- First Year Published: 2015
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Trusted Platform Modules at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
3Information systems security
By International Conference on Information Systems Security (4th 2008 Hyderabad, India)

“Information systems security” Metadata:
- Title: Information systems security
- Author: ➤ International Conference on Information Systems Security (4th 2008 Hyderabad, India)
- Language: English
- Number of Pages: Median: 305
- Publisher: Springer
- Publish Date: 2008
- Publish Location: Berlin
“Information systems security” Subjects and Themes:
- Subjects: ➤ Access control - Datensicherung - Trusted Computing - Computers - Congresses - Kongress - Computersicherheit - Informationssystem - Serviceorientierte Architektur - Rechnernetz - Computer security - Eindringerkennung - Kryptologie - Kryptoanalyse - Computers, access control
- Places: ➤ 2008> Hyderabad <Andhra Pradesh
Edition Identifiers:
- The Open Library ID: OL24114988M
- Online Computer Library Center (OCLC) ID: 276807196
- Library of Congress Control Number (LCCN): 2008940485
- All ISBNs: 3540898611 - 9783540898610
Access and General Info:
- First Year Published: 2008
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Information systems security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
4Trusted computing
By Norbert Pohlmann

“Trusted computing” Metadata:
- Title: Trusted computing
- Author: Norbert Pohlmann
- Language: ger
- Number of Pages: Median: 252
- Publisher: ➤ Vieweg Verlag, Friedr, & Sohn Verlagsgesellschaft mbH - Vieweg
- Publish Date: 2008
- Publish Location: Wiesbaden
“Trusted computing” Subjects and Themes:
- Subjects: ➤ Datensicherheit - Trusted Computing - Rechnerarchitektur - Datenschutz - Softwarearchitektur - Computersicherheit
Edition Identifiers:
- The Open Library ID: OL37148301M - OL27092979M
- Online Computer Library Center (OCLC) ID: 244077814
- All ISBNs: 9783834894526 - 383480309X - 9783834803092 - 3834894524
Access and General Info:
- First Year Published: 2008
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Trusted computing at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
5Scalability of Networks and Services Lecture Notes in Computer Science
By Aiko Pras

“Scalability of Networks and Services Lecture Notes in Computer Science” Metadata:
- Title: ➤ Scalability of Networks and Services Lecture Notes in Computer Science
- Author: Aiko Pras
- Publisher: Springer
- Publish Date: 2009
“Scalability of Networks and Services Lecture Notes in Computer Science” Subjects and Themes:
- Subjects: ➤ Computer networks - Information systems - Computer science - Information storage and retrieval systems - Computer system performance - Computer security - Congresses - Management - Scalability - Autonomic Computing - Kongress - Monitoring <Informatik> - Visualisierung - Netzwerkverwaltung - Netzwerktopologie - Konfigurationsverwaltung - Overlay-Netz - Peer-to-Peer-Netz - Trusted Computing
Edition Identifiers:
- The Open Library ID: OL26168609M
- Online Computer Library Center (OCLC) ID: 419646609
- Library of Congress Control Number (LCCN): 2009929558
- All ISBNs: 3642026265 - 9783642026263
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Scalability of Networks and Services Lecture Notes in Computer Science at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
6Identity and privacy in the Internet age
By Nordic Conference on Secure IT Systems (14th 2009 Oslo, Norway)

“Identity and privacy in the Internet age” Metadata:
- Title: ➤ Identity and privacy in the Internet age
- Author: ➤ Nordic Conference on Secure IT Systems (14th 2009 Oslo, Norway)
- Language: English
- Number of Pages: Median: 301
- Publisher: Springer
- Publish Date: 2009
- Publish Location: New York - Berlin
“Identity and privacy in the Internet age” Subjects and Themes:
- Subjects: ➤ Zugriffskontrolle - Mobile Computing - Netzwerkschicht - Privatsphäre - Internet - Kryptoanalyse - Eingebettetes System - Computer networks - Trusted Computing - Anwendungssystem - Kongress - Netzwerktopologie - Congresses - Identitätsverwaltung - Computer security - Anonymität - Security measures - Data encryption (Computer science) - Information systems - Coding theory - Data structures (Computer science) - Data protection - Computer science - Internet, security measures
- Places: Oslo <2009>
Edition Identifiers:
- The Open Library ID: OL25040994M
- Online Computer Library Center (OCLC) ID: 465166561
- Library of Congress Control Number (LCCN): 2009935066
- All ISBNs: 3642047653 - 9783642047657
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Identity and privacy in the Internet age at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
7Data and applications security and privacy XXIV
By IFIP WG 11.3 Working Conference on Data and Applications Security (24th 2010 Rome, Italy)

“Data and applications security and privacy XXIV” Metadata:
- Title: ➤ Data and applications security and privacy XXIV
- Author: ➤ IFIP WG 11.3 Working Conference on Data and Applications Security (24th 2010 Rome, Italy)
- Language: English
- Number of Pages: Median: 376
- Publisher: Springer
- Publish Date: 2010
- Publish Location: Berlin - New York
“Data and applications security and privacy XXIV” Subjects and Themes:
- Subjects: ➤ Zugriffskontrolle - Datensicherung - Database security - Privatsphäre - Abfrageverarbeitung - Congresses - Identitätsverwaltung - Datenbanksystem - Trusted Computing - Computer security - Data protection
- Places: Rom 2010
Edition Identifiers:
- The Open Library ID: OL25313825M
- Online Computer Library Center (OCLC) ID: 644521801
- Library of Congress Control Number (LCCN): 2010928333
- All ISBNs: 9783642137389 - 3642137385
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Data and applications security and privacy XXIV at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
8Data And Applications Security Xxiii 23rd Annual Ifip Wg 113 Working Conference Montreal Canada July 1215 2009 Proceedings
By Jaideep Vaidya

“Data And Applications Security Xxiii 23rd Annual Ifip Wg 113 Working Conference Montreal Canada July 1215 2009 Proceedings” Metadata:
- Title: ➤ Data And Applications Security Xxiii 23rd Annual Ifip Wg 113 Working Conference Montreal Canada July 1215 2009 Proceedings
- Author: Jaideep Vaidya
- Number of Pages: Median: 326
- Publisher: Springer
- Publish Date: 2009
“Data And Applications Security Xxiii 23rd Annual Ifip Wg 113 Working Conference Montreal Canada July 1215 2009 Proceedings” Subjects and Themes:
- Subjects: ➤ Data encryption (Computer science) - Information Systems - Computer science - Software engineering - Computer networks - Data protection - Computer software - Database security - Congresses - Anwendungssystem - Kongress - Privatsphäre - Datensicherung - Zugriffskontrolle - Datenbanksystem - Abfrage - Rechnernetz - Kryptoanalyse - Systemplattform - Trusted Computing - Electronic data processing, distributed processing - Electronic commerce - Internet, security measures
Edition Identifiers:
- The Open Library ID: OL25969993M
- Online Computer Library Center (OCLC) ID: 427321495
- Library of Congress Control Number (LCCN): 2009929941
- All ISBNs: 9783642030062 - 3642030068
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Data And Applications Security Xxiii 23rd Annual Ifip Wg 113 Working Conference Montreal Canada July 1215 2009 Proceedings at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
9Information and Communications Security
By ICICS <12, 2010, Barcelona>

“Information and Communications Security” Metadata:
- Title: ➤ Information and Communications Security
- Author: ICICS <12, 2010, Barcelona>
- Language: ger
- Publisher: Springer Berlin Heidelberg
- Publish Date: 2004
- Publish Location: Berlin, Heidelberg
“Information and Communications Security” Subjects and Themes:
- Subjects: ➤ Zugriffskontrolle - Datensicherung - Trusted Computing - Computersicherheit - Privatsphäre - Kryptosystem - Anonymität - Kryptoanalyse - Authentifikation
Edition Identifiers:
- The Open Library ID: OL27045405M
- Online Computer Library Center (OCLC) ID: 724681708
- All ISBNs: 9783540301912 - 3540301917
Access and General Info:
- First Year Published: 2004
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information and Communications Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
10Integrated management of systems, services, processes and people in IT
By IFIP/IEEE International Workshop on Distributed Systems: Operation and Management (20th 2009 Venice, Italy)

“Integrated management of systems, services, processes and people in IT” Metadata:
- Title: ➤ Integrated management of systems, services, processes and people in IT
- Author: ➤ IFIP/IEEE International Workshop on Distributed Systems: Operation and Management (20th 2009 Venice, Italy)
- Language: English
- Number of Pages: Median: 190
- Publisher: Springer
- Publish Date: 2009
- Publish Location: New York - Berlin
“Integrated management of systems, services, processes and people in IT” Subjects and Themes:
- Subjects: ➤ World Wide Web - Management - Anwendungssystem - Dienstverwaltung - Verteiltes System - Overlay-Netz - Change Management - Extranets (Computer networks) - Netzwerkverwaltung - Peer-to-Peer-Netz - Electronic data processing - Trusted Computing - Serviceorientierte Architektur - Distributed processing - Congresses - Computer networks - Autonomic Computing - Extranets (computer networks) - Electronic data processing, distributed processing
Edition Identifiers:
- The Open Library ID: OL25114832M
- Online Computer Library Center (OCLC) ID: 449850386
- Library of Congress Control Number (LCCN): 2009936144
- All ISBNs: 9783642049880 - 3642049885
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Integrated management of systems, services, processes and people in IT at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
11Information Security
By Pierangela Samarati

“Information Security” Metadata:
- Title: Information Security
- Author: Pierangela Samarati
- Language: English
- Publisher: Springer Berlin Heidelberg
- Publish Date: 2009
- Publish Location: Berlin, Heidelberg
“Information Security” Subjects and Themes:
- Subjects: ➤ Data protection - Computer software - Computer science - Software engineering - Data encryption (Computer science) - Computer security - Congresses - Computers - Access control - Computersicherheit - Kongress - Datensicherung - Eindringerkennung - Kryptoanalyse - Kryptosystem - Zugriffskontrolle - Authentifikation - Sicherheitsprotokoll - Trusted Computing - Computers, access control
Edition Identifiers:
- The Open Library ID: OL25535918M
- Online Computer Library Center (OCLC) ID: 436029082
- Library of Congress Control Number (LCCN): 2009934111
- All ISBNs: 9783642044748 - 3642044735 - 9783642044731 - 3642044743
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
12Information Security Applications
By Hutchison, David - undifferentiated

“Information Security Applications” Metadata:
- Title: ➤ Information Security Applications
- Author: ➤ Hutchison, David - undifferentiated
- Language: English
- Number of Pages: Median: 334
- Publisher: ➤ Springer-Verlag - Springer Berlin Heidelberg
- Publish Date: 2009
- Publish Location: Berlin, Heidelberg
“Information Security Applications” Subjects and Themes:
- Subjects: ➤ Information Systems - Data encryption (Computer science) - Software engineering - Computer science - Data protection - Computer software - Computer security - Congresses - Chipkarte - Kongress - Datensicherung - Drahtloses Sensorsystem - Computersicherheit - Kryptoanalyse - Kryptosystem - Trusted Computing
Edition Identifiers:
- The Open Library ID: OL25542781M
- Online Computer Library Center (OCLC) ID: 310400683
- Library of Congress Control Number (LCCN): 2009920695
- All ISBNs: 9783642003059 - 9783642003066 - 3642003052 - 3642003060
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information Security Applications at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
13Secure Data Management 6th Vldb Workshop Sdm 2009 Lyon France August 28 2009 Proceedings
By Willem Jonker

“Secure Data Management 6th Vldb Workshop Sdm 2009 Lyon France August 28 2009 Proceedings” Metadata:
- Title: ➤ Secure Data Management 6th Vldb Workshop Sdm 2009 Lyon France August 28 2009 Proceedings
- Author: Willem Jonker
- Publisher: Springer
- Publish Date: 2009
“Secure Data Management 6th Vldb Workshop Sdm 2009 Lyon France August 28 2009 Proceedings” Subjects and Themes:
- Subjects: ➤ Information Systems - Data encryption (Computer science) - Database management - Information storage and retrieval systems - Computer network architectures - Computer science - Authentication - Congresses - Computer security - Datenbanksystem - Kongress - Datensicherung - Datenverwaltung - Privatsphäre - Trusted Computing - Zugriffskontrolle - Authentifikation
Edition Identifiers:
- The Open Library ID: OL25995094M
- Online Computer Library Center (OCLC) ID: 436029042
- Library of Congress Control Number (LCCN): 2009933478
- All ISBNs: 364204218X - 9783642042188
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Secure Data Management 6th Vldb Workshop Sdm 2009 Lyon France August 28 2009 Proceedings at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
14Identity and privacy in the Internet age
By Nordic Conference on Secure IT Systems (14th 2009 Oslo, Norway)

“Identity and privacy in the Internet age” Metadata:
- Title: ➤ Identity and privacy in the Internet age
- Author: ➤ Nordic Conference on Secure IT Systems (14th 2009 Oslo, Norway)
- Language: English
- Number of Pages: Median: 301
- Publisher: Springer
- Publish Date: 2009
- Publish Location: New York - Berlin
“Identity and privacy in the Internet age” Subjects and Themes:
- Subjects: ➤ Zugriffskontrolle - Mobile Computing - Netzwerkschicht - Privatsphäre - Internet - Kryptoanalyse - Eingebettetes System - Computer networks - Trusted Computing - Anwendungssystem - Kongress - Netzwerktopologie - Congresses - Identitätsverwaltung - Computer security - Anonymität - Security measures
- Places: Oslo <2009>
Edition Identifiers:
- The Open Library ID: OL25040995M
- Online Computer Library Center (OCLC) ID: 465166561
- Library of Congress Control Number (LCCN): 2009935066
- All ISBNs: 3642047653 - 9783642047657
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Identity and privacy in the Internet age at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
15Trustworthy Global Computing 4th International Symposium Tgc 2008 Barcelona Spain November 34 2008 Revised Selected Papers
By Christos Kaklamanis

“Trustworthy Global Computing 4th International Symposium Tgc 2008 Barcelona Spain November 34 2008 Revised Selected Papers” Metadata:
- Title: ➤ Trustworthy Global Computing 4th International Symposium Tgc 2008 Barcelona Spain November 34 2008 Revised Selected Papers
- Author: Christos Kaklamanis
- Publisher: Springer
- Publish Date: 2009
“Trustworthy Global Computing 4th International Symposium Tgc 2008 Barcelona Spain November 34 2008 Revised Selected Papers” Subjects and Themes:
- Subjects: ➤ Logic design - Computer networks - Computer science - Software engineering - Data protection - Computer security - Congresses - Security measures - Computer software - Validation - Verification - Grid Computing - Kongress - Trusted Computing - Serviceorientierte Architektur - Sicherheitsprotokoll - Datensicherung - Anonymität - Verteiltes System - Prozessalgebra - Globalization - Reliability - Software protection
Edition Identifiers:
- The Open Library ID: OL26041329M
- Online Computer Library Center (OCLC) ID: 317920910
- Library of Congress Control Number (LCCN): 2009929950
- All ISBNs: 9783642009440 - 3642009441
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Trustworthy Global Computing 4th International Symposium Tgc 2008 Barcelona Spain November 34 2008 Revised Selected Papers at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
16Trustworthy global computing
By TGC 2006 (2006 Lucca, Italy)

“Trustworthy global computing” Metadata:
- Title: Trustworthy global computing
- Author: TGC 2006 (2006 Lucca, Italy)
- Language: English
- Number of Pages: Median: 338
- Publisher: Springer
- Publish Date: 2007
- Publish Location: Berlin - New York
“Trustworthy global computing” Subjects and Themes:
- Subjects: ➤ Verteiltes System - Redes de computadores (medidas de segurança;congressos) - Grid Computing - Segurança de computadores (congressos) - Software protection - Sicherheitsprotokoll - Datensicherung - Computer networks - Trusted Computing - Softwares (proteção;congressos) - Serviceorientierte Architektur - Reliability - Congresses - Computer security - Anonymität - Security measures - Prozessalgebra - Computer networks, security measures - Computer software, validation - Computer software, verification
Edition Identifiers:
- The Open Library ID: OL25328020M
- Online Computer Library Center (OCLC) ID: 176931842
- Library of Congress Control Number (LCCN): 2007939452
- All ISBNs: 3540753338 - 9783540753339
Access and General Info:
- First Year Published: 2007
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Trustworthy global computing at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.