Download free course Platform Embedded Security Technology Revealed, pdf file on 263 pages by Xiaoyu Ruan.
Platform Embedded Security Technology Revealed is an in-depth introduction to Intel's platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects applications' secrets and users' privacy in a secure, light-weight, and inexpensive way. Besides native built-in features, it allows third-party software vendors to develop applications that take advantage of the security infrastructures offered by the engine.
Intel's security and management engine is technologically unique and significant, but is largely unknown to many members of the tech communities who could potentially benefit from it. Platform Embedded Security Technology Revealed reveals technical details of the engine. The engine provides a new way for the computer security industry to resolve critical problems resulting from booming mobile technologies, such as increasing threats against confidentiality and privacy. This book describes how this advanced level of protection is made possible by the engine, how it can improve users' security experience, and how third-party vendors can make use of it.
It's written for computer security professionals and researchers; embedded system engineers; and software engineers and vendors who are interested in developing new security applications on top of Intel's security and management engine.
It's also written for advanced users who are interested in understanding how the security features of Intel's platforms work.
Table of contentsCyber Security in the Mobile Age
Intel's Embedded Solutions: from Management to Security
Building Blocks of the Security and Management Engine
The Engine: Safeguarding Itself before Safeguarding Others
Privacy at the Next Level: Intel's Enhanced Privacy Identification (EPID) Technology
Boot with Integrity, or Don't Boot
Trust Computing, Backed by the Intel Platform Trust Technology
Unleashing Premium Entertainment with Hardware-Based Content Protection Technology
Breaking the Boundaries with Dynamically Loaded Applications
Intel Identity Protection Technology: the Robust, Convenient, and Cost-Effective Way to Deter Identity Theft
Looking Ahead: Tomorrow's Innovations Built on Today's Foundation
Others related eBooks about Platform Embedded Security Technology Revealed
Security Infrastructure Technology for Integrated Utilization of Big Data
Download free course Security Infrastructure Technology for Integrated Utilization of Big Data, pdf file on 171 pages by Atsuko Miyaji, Tomoaki Mimoto....
Voice over IP overview in pdf
Download free training tutorial in pdf about VoIP (Voice over IP),document in 46 pages designated to intermediate level-users....
Rational Cybersecurity for Business
Download free course Rational Cybersecurity for Business, pdf file on 349 pages by Dan Blum....
Introduction to Ethical Hacking
Download Introduction to ethical hacking in PDF, training document under 12 pages intended to beginners....
Creating a Production Launch Plan
Download free course Creating a Production Launch Plan, pdf file on 45 pages by Alec Warner, Vitaliy Shipitsyn, Carmela Quinito....
Secrets of Network Cartography: A Comprehensive Guide to Nmap
Download free eBook about Network cryptography and Nmap, Secrets of Network Cartography: A Comprehensive Guide to Nmap....
Spatial Thinking in Planning Practice
Download free course Spatial Thinking in Planning Practice, pdf file on 61 pages by Yiping Fang, Vivek Shandas, Eugenio Arriaga....
Planning and Preparing for Microsoft SharePoint Hybrid
Download free course Planning and Preparing for Microsoft SharePoint Hybrid, pdf file on 113 pages by Jeremy Taylor....
Firewall and Proxy Server
Download free Firewall and Proxy Tutorial course material, tutorial training, PDF file by Mark Grennan on 40 pages...
Computer Networks: A Systems Approach
This book explores the key principles of computer networking, with examples drawn from the real world of network and protocol design. Using the Internet as the primary example, this best selling and classic textbook explains various protocols and networking technologies. The systems oriented appro...