Platform Embedded Security Technology Revealed



Download free course Platform Embedded Security Technology Revealed, pdf file on 263 pages by Xiaoyu Ruan.
Platform Embedded Security Technology Revealed is an in-depth introduction to Intel's platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects applications' secrets and users' privacy in a secure, light-weight, and inexpensive way. Besides native built-in features, it allows third-party software vendors to develop applications that take advantage of the security infrastructures offered by the engine.

Intel's security and management engine is technologically unique and significant, but is largely unknown to many members of the tech communities who could potentially benefit from it. Platform Embedded Security Technology Revealed reveals technical details of the engine. The engine provides a new way for the computer security industry to resolve critical problems resulting from booming mobile technologies, such as increasing threats against confidentiality and privacy. This book describes how this advanced level of protection is made possible by the engine, how it can improve users' security experience, and how third-party vendors can make use of it.

It's written for computer security professionals and researchers; embedded system engineers; and software engineers and vendors who are interested in developing new security applications on top of Intel's security and management engine.

It's also written for advanced users who are interested in understanding how the security features of Intel's platforms work.

Table of contents

  • Cyber Security in the Mobile Age
  • Intel's Embedded Solutions: from Management to Security
  • Building Blocks of the Security and Management Engine
  • The Engine: Safeguarding Itself before Safeguarding Others
  • Privacy at the Next Level: Intel's Enhanced Privacy Identification (EPID) Technology
  • Boot with Integrity, or Don't Boot
  • Trust Computing, Backed by the Intel Platform Trust Technology
  • Unleashing Premium Entertainment with Hardware-Based Content Protection Technology
  • Breaking the Boundaries with Dynamically Loaded Applications
  • Intel Identity Protection Technology: the Robust, Convenient, and Cost-Effective Way to Deter Identity Theft
  • Looking Ahead: Tomorrow's Innovations Built on Today's Foundation
Pages : 263
Size : 4.3 MB
File type : PDF
Downloads: 95
Created: 2022-02-03
License: CC BY-NC-ND
Author(s): Xiaoyu Ruan
Platform Embedded Security Technology Revealed

Warning: Trying to access array offset on false in /home/tutovnfz/public_html/article.php on line 233

Others security Tutorials

Rational Cybersecurity for Business

Cyber Security Planning Guide

Web Application Security for Dummies - Qualys Limited Edition

Guide to Computer Network Security

Rational Cybersecurity for Business

Others related eBooks about Platform Embedded Security Technology Revealed

Social Theory after the Internet

Download free course Social Theory after the Internet, pdf file on 210 pages by Ralph Schroeder....

Voice over IP overview in pdf

Download free training tutorial in pdf about VoIP (Voice over IP),document in 46 pages designated to intermediate level-users....

PC Assembly Language

Download free course PC Assembly Language, pdf file on 190 pages by Paul A. Carter....

How to configure Voice over IP

This pdf tutorial you will learn how to install, configure, and administer Voice over IP.free training document designated to beginners....

Linux Network Administrator's Guide

Download free course Linux Network Administrator's Guide, pdf file on 507 pages by Olaf Kirch, Terry Dawson....

Hacking Portugal

Download free course Hacking Portugal, pdf file on 67 pages by Dinis Cruz....

Rethinking the Internet of Things

Download free course Rethinking the Internet of Things, pdf file on 185 pages by Francis daCosta, Byron Henderson....

Introduction to Ethical Hacking

Download Introduction to ethical hacking in PDF, training document under 12 pages intended to beginners....

Virtual Private Networks free tutorial

Download free pdf tutorial about Virtual Private Networks, document created by FEUP MPR under Creative commons license. A VPN is a secure tunnel (we can also speak of a virtual link) allowing communication between two entities, including over insecure networks such as the Internet....

Firewall security

Download free Firewall Tutorial course material, tutorial training, PDF file by Cisco Systems on 21 pages....