Explore: Trusted Computing

Discover books, insights, and more — all in one place.

Learn more about Trusted Computing with top reads curated from trusted sources — all in one place.

Topic Search

Search for any topic

AI-Generated Overview About “trusted-computing”:


Books Results

Source: The Open Library

The Open Library Search Results

Search results from The Open Library

1Hacking the Xbox

An Introduction to Reverse Engineering

By

Book's cover

“Hacking the Xbox” Metadata:

  • Title: Hacking the Xbox
  • Author:
  • Language: English
  • Number of Pages: Median: 288
  • Publisher: ➤  Tandem Library - Xenatera Press - No Starch Press
  • Publish Date:

“Hacking the Xbox” Subjects and Themes:

Edition Identifiers:

First Setence:

"Hardware hacking may seem daunting at first because of the sophisticated tools that are required for some projects."

Access and General Info:

  • First Year Published: 2003
  • Is Full Text Available: Yes
  • Is The Book Public: No
  • Access Status: Borrowable

Online Access

Downloads Are Not Available:

The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.

Online Borrowing:

Online Marketplaces

Find Hacking the Xbox at online marketplaces:


2Trusted Platform Modules

By

“Trusted Platform Modules” Metadata:

  • Title: Trusted Platform Modules
  • Author:
  • Language: English
  • Publisher: ➤  Institution of Engineering & Technology
  • Publish Date:

“Trusted Platform Modules” Subjects and Themes:

Edition Identifiers:

Access and General Info:

  • First Year Published: 2015
  • Is Full Text Available: No
  • Is The Book Public: No
  • Access Status: No_ebook

Online Marketplaces

Find Trusted Platform Modules at online marketplaces:


3Information systems security

By

Book's cover

“Information systems security” Metadata:

  • Title: Information systems security
  • Author: ➤  
  • Language: English
  • Number of Pages: Median: 305
  • Publisher: Springer
  • Publish Date:
  • Publish Location: Berlin

“Information systems security” Subjects and Themes:

Edition Identifiers:

Access and General Info:

  • First Year Published: 2008
  • Is Full Text Available: No
  • Is The Book Public: No
  • Access Status: No_ebook

Online Marketplaces

Find Information systems security at online marketplaces:


4Trusted computing

By

Book's cover

“Trusted computing” Metadata:

  • Title: Trusted computing
  • Author:
  • Language: ger
  • Number of Pages: Median: 252
  • Publisher: ➤  Vieweg Verlag, Friedr, & Sohn Verlagsgesellschaft mbH - Vieweg
  • Publish Date:
  • Publish Location: Wiesbaden

“Trusted computing” Subjects and Themes:

Edition Identifiers:

Access and General Info:

  • First Year Published: 2008
  • Is Full Text Available: No
  • Is The Book Public: No
  • Access Status: No_ebook

Online Marketplaces

Find Trusted computing at online marketplaces:


5Scalability of Networks and Services Lecture Notes in Computer Science

By

Book's cover

“Scalability of Networks and Services Lecture Notes in Computer Science” Metadata:

  • Title: ➤  Scalability of Networks and Services Lecture Notes in Computer Science
  • Author:
  • Publisher: Springer
  • Publish Date:

“Scalability of Networks and Services Lecture Notes in Computer Science” Subjects and Themes:

Edition Identifiers:

Access and General Info:

  • First Year Published: 2009
  • Is Full Text Available: No
  • Is The Book Public: No
  • Access Status: Unclassified

Online Access

Downloads Are Not Available:

The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.

Online Borrowing:

    Online Marketplaces

    Find Scalability of Networks and Services Lecture Notes in Computer Science at online marketplaces:


    6Identity and privacy in the Internet age

    By

    Book's cover

    “Identity and privacy in the Internet age” Metadata:

    • Title: ➤  Identity and privacy in the Internet age
    • Author: ➤  
    • Language: English
    • Number of Pages: Median: 301
    • Publisher: Springer
    • Publish Date:
    • Publish Location: New York - Berlin

    “Identity and privacy in the Internet age” Subjects and Themes:

    Edition Identifiers:

    Access and General Info:

    • First Year Published: 2009
    • Is Full Text Available: No
    • Is The Book Public: No
    • Access Status: Unclassified

    Online Access

    Downloads Are Not Available:

    The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.

    Online Borrowing:

      Online Marketplaces

      Find Identity and privacy in the Internet age at online marketplaces:


      7Data and applications security and privacy XXIV

      By

      Book's cover

      “Data and applications security and privacy XXIV” Metadata:

      • Title: ➤  Data and applications security and privacy XXIV
      • Author: ➤  
      • Language: English
      • Number of Pages: Median: 376
      • Publisher: Springer
      • Publish Date:
      • Publish Location: Berlin - New York

      “Data and applications security and privacy XXIV” Subjects and Themes:

      Edition Identifiers:

      Access and General Info:

      • First Year Published: 2010
      • Is Full Text Available: No
      • Is The Book Public: No
      • Access Status: Unclassified

      Online Access

      Downloads Are Not Available:

      The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.

      Online Borrowing:

        Online Marketplaces

        Find Data and applications security and privacy XXIV at online marketplaces:


        8Data And Applications Security Xxiii 23rd Annual Ifip Wg 113 Working Conference Montreal Canada July 1215 2009 Proceedings

        By

        Book's cover

        “Data And Applications Security Xxiii 23rd Annual Ifip Wg 113 Working Conference Montreal Canada July 1215 2009 Proceedings” Metadata:

        • Title: ➤  Data And Applications Security Xxiii 23rd Annual Ifip Wg 113 Working Conference Montreal Canada July 1215 2009 Proceedings
        • Author:
        • Number of Pages: Median: 326
        • Publisher: Springer
        • Publish Date:

        “Data And Applications Security Xxiii 23rd Annual Ifip Wg 113 Working Conference Montreal Canada July 1215 2009 Proceedings” Subjects and Themes:

        Edition Identifiers:

        Access and General Info:

        • First Year Published: 2009
        • Is Full Text Available: No
        • Is The Book Public: No
        • Access Status: No_ebook

        Online Marketplaces

        Find Data And Applications Security Xxiii 23rd Annual Ifip Wg 113 Working Conference Montreal Canada July 1215 2009 Proceedings at online marketplaces:


        9Information and Communications Security

        By

        Book's cover

        “Information and Communications Security” Metadata:

        • Title: ➤  Information and Communications Security
        • Author:
        • Language: ger
        • Publisher: Springer Berlin Heidelberg
        • Publish Date:
        • Publish Location: Berlin, Heidelberg

        “Information and Communications Security” Subjects and Themes:

        Edition Identifiers:

        Access and General Info:

        • First Year Published: 2004
        • Is Full Text Available: No
        • Is The Book Public: No
        • Access Status: No_ebook

        Online Access

        Downloads Are Not Available:

        The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.

        Online Borrowing:

          Online Marketplaces

          Find Information and Communications Security at online marketplaces:


          10Integrated management of systems, services, processes and people in IT

          By

          Book's cover

          “Integrated management of systems, services, processes and people in IT” Metadata:

          • Title: ➤  Integrated management of systems, services, processes and people in IT
          • Author: ➤  
          • Language: English
          • Number of Pages: Median: 190
          • Publisher: Springer
          • Publish Date:
          • Publish Location: New York - Berlin

          “Integrated management of systems, services, processes and people in IT” Subjects and Themes:

          Edition Identifiers:

          Access and General Info:

          • First Year Published: 2009
          • Is Full Text Available: No
          • Is The Book Public: No
          • Access Status: No_ebook

          Online Marketplaces

          Find Integrated management of systems, services, processes and people in IT at online marketplaces:


          11Information Security

          By

          Book's cover

          “Information Security” Metadata:

          • Title: Information Security
          • Author:
          • Language: English
          • Publisher: Springer Berlin Heidelberg
          • Publish Date:
          • Publish Location: Berlin, Heidelberg

          “Information Security” Subjects and Themes:

          Edition Identifiers:

          Access and General Info:

          • First Year Published: 2009
          • Is Full Text Available: No
          • Is The Book Public: No
          • Access Status: No_ebook

          Online Access

          Downloads Are Not Available:

          The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.

          Online Borrowing:

            Online Marketplaces

            Find Information Security at online marketplaces:


            12Information Security Applications

            By

            Book's cover

            “Information Security Applications” Metadata:

            • Title: ➤  Information Security Applications
            • Author: ➤  
            • Language: English
            • Number of Pages: Median: 334
            • Publisher: ➤  Springer-Verlag - Springer Berlin Heidelberg
            • Publish Date:
            • Publish Location: Berlin, Heidelberg

            “Information Security Applications” Subjects and Themes:

            Edition Identifiers:

            Access and General Info:

            • First Year Published: 2009
            • Is Full Text Available: No
            • Is The Book Public: No
            • Access Status: No_ebook

            Online Access

            Downloads Are Not Available:

            The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.

            Online Borrowing:

              Online Marketplaces

              Find Information Security Applications at online marketplaces:


              13Secure Data Management 6th Vldb Workshop Sdm 2009 Lyon France August 28 2009 Proceedings

              By

              Book's cover

              “Secure Data Management 6th Vldb Workshop Sdm 2009 Lyon France August 28 2009 Proceedings” Metadata:

              • Title: ➤  Secure Data Management 6th Vldb Workshop Sdm 2009 Lyon France August 28 2009 Proceedings
              • Author:
              • Publisher: Springer
              • Publish Date:

              “Secure Data Management 6th Vldb Workshop Sdm 2009 Lyon France August 28 2009 Proceedings” Subjects and Themes:

              Edition Identifiers:

              Access and General Info:

              • First Year Published: 2009
              • Is Full Text Available: No
              • Is The Book Public: No
              • Access Status: No_ebook

              Online Marketplaces

              Find Secure Data Management 6th Vldb Workshop Sdm 2009 Lyon France August 28 2009 Proceedings at online marketplaces:


              14Identity and privacy in the Internet age

              By

              Book's cover

              “Identity and privacy in the Internet age” Metadata:

              • Title: ➤  Identity and privacy in the Internet age
              • Author: ➤  
              • Language: English
              • Number of Pages: Median: 301
              • Publisher: Springer
              • Publish Date:
              • Publish Location: New York - Berlin

              “Identity and privacy in the Internet age” Subjects and Themes:

              Edition Identifiers:

              Access and General Info:

              • First Year Published: 2009
              • Is Full Text Available: No
              • Is The Book Public: No
              • Access Status: No_ebook

              Online Marketplaces

              Find Identity and privacy in the Internet age at online marketplaces:


              15Trustworthy Global Computing 4th International Symposium Tgc 2008 Barcelona Spain November 34 2008 Revised Selected Papers

              By

              Book's cover

              “Trustworthy Global Computing 4th International Symposium Tgc 2008 Barcelona Spain November 34 2008 Revised Selected Papers” Metadata:

              • Title: ➤  Trustworthy Global Computing 4th International Symposium Tgc 2008 Barcelona Spain November 34 2008 Revised Selected Papers
              • Author:
              • Publisher: Springer
              • Publish Date:

              “Trustworthy Global Computing 4th International Symposium Tgc 2008 Barcelona Spain November 34 2008 Revised Selected Papers” Subjects and Themes:

              Edition Identifiers:

              Access and General Info:

              • First Year Published: 2009
              • Is Full Text Available: No
              • Is The Book Public: No
              • Access Status: No_ebook

              Online Marketplaces

              Find Trustworthy Global Computing 4th International Symposium Tgc 2008 Barcelona Spain November 34 2008 Revised Selected Papers at online marketplaces:


              16Trustworthy global computing

              By

              Book's cover

              “Trustworthy global computing” Metadata:

              • Title: Trustworthy global computing
              • Author:
              • Language: English
              • Number of Pages: Median: 338
              • Publisher: Springer
              • Publish Date:
              • Publish Location: Berlin - New York

              “Trustworthy global computing” Subjects and Themes:

              Edition Identifiers:

              Access and General Info:

              • First Year Published: 2007
              • Is Full Text Available: No
              • Is The Book Public: No
              • Access Status: No_ebook

              Online Marketplaces

              Find Trustworthy global computing at online marketplaces:



              Wiki

              Source: Wikipedia

              Wikipedia Results

              Search Results from Wikipedia

              Trusted Computing

              Trusted Computing (TC) is a technology developed and promoted by the Trusted Computing Group. The term is taken from the field of trusted systems and

              Next-Generation Secure Computing Base

              implement Trusted Computing concepts to Windows. NGSCB was the result of years of research and development within Microsoft to create a secure computing solution

              Confidential computing

              secure multi-party computation, and Trusted Computing. Confidential computing is promoted by the Confidential Computing Consortium (CCC) industry group,

              Trusted Computing Group

              enable trusted computing features in computers and mobile devices. Related efforts involved Trusted Network Connect, to bring trusted computing to network

              Trusted computing base

              secure upgrades of the trusted computing base poses bootstrap problems of its own. As stated above, trust in the trusted computing base is required to make

              Trusted client

              In computing, a trusted client is a device or program controlled by the user of a service, but with restrictions designed to prevent its use in ways not

              Trusted Platform Module

              deployed was 1.1b in 2003. Trusted Platform Module (TPM) was conceived by a computer industry consortium called Trusted Computing Group (TCG). It evolved

              Trusted Execution Technology

              authentic operating system starts in a trusted environment, which can then be considered trusted. Provision of a trusted operating system with additional security

              Trustworthy computing

              The term trustworthy computing (TwC) has been applied to computing systems that are inherently secure, available, and reliable. It is particularly associated

              Trusted system

              trusted system is one that is relied upon to a specified extent to enforce a specified security policy. This is equivalent to saying that a trusted system