Mardigian Library
Ask a QuestionMy Library Account
Search Library Catalog - Books, DVDs & More
Limit to available
More Searches
Limit results to available items
Find more results:
Search MelCat
More Information
Trusted Computing [electronic resource] / C. Mitchell (ed.)
Stevenage IET 2005
book jacket
Location Call Number Status
 Electronic Book  WEB LINK    AVAIL. VIA WEB
Subject(s) Computer security
Peer-to-peer architecture (Computer networks)
Physical Description 328
Summary This book is designed to provide an introduction to trusted computing technology and its applications. It is divided into four main parts, as follows: 1. Introduction to trusted computing; 2. Trusted computing technologies; 3. Applications of trusted computing; and 4. The future of trusted computing. The first part consists of three chapters, each approaching trusted computing from a somewhat different perspective. In the second part, made up of Chapters 4 and 5, two technologies fundamental to the future application of trusted computing are discussed. The discussion of applications of trusted computing in Part 3 contains five chapters, each looking at a different possible application of this technology. Finally, Part 4 contains a single chapter giving thoughts on the future of this potentially revolutionary technology
Series Professional Applications of Computing series

Mardigian Library, 4901 Evergreen Rd.
Dearborn, MI 48128-1491 313-593-5400 fax 313-593-5561
The Regents of the University of Michigan | Non-Discrimination Policy
Copyright © The University of Michigan - Dearborn • 4901 Evergreen Road • Dearborn, Michigan 48128 • 313-593-5000
The University of Michigan - Ann Arbor | The University of Michigan - Flint | SITEMAP | DIRECTORY | CONTACT