Presents primary hardware-based computer security approaches in an easy-to-read toolbox format <p>Protecting valuable personal information against theft is a mission-critical component of today’s electronic business community. In an effort to combat this serious and growing problem, the Intelligence and Defense communities have successfully employed the use of hardware-based security devices.</p> <p>This book provides a road map of the hardware-based security devices that can defeat—and prevent—attacks by hackers. Beginning with an overview of the basic elements of computer security, the book covers:</p> <ul> <li> <p>Cryptography</p> </li> <li> <p>Key generation and distribution</p> </li> <li> <p>The qualities of security solutions</p> </li> <li> <p>Secure co-processors</p> </li> <li> <p>Secure bootstrap loading</p> </li> <li> <p>Secure memory management and trusted execution technology</p> </li> <li> <p>Trusted Platform Module (TPM)</p> </li> <li> <p>Field Programmable Gate Arrays (FPGAs)</p> </li> <li> <p>Hardware-based authentification</p> </li> <li> <p>Biometrics</p> </li> <li> <p>Tokens</p> </li> <li> <p>Location technologies</p> </li> </ul> <p><i>Hardware-Based Computer Security Techniques to Defeat Hackers</i> includes a chapter devoted entirely to showing readers how they can implement the strategies and technologies discussed. Finally, it concludes with two examples of security systems put into practice.</p> <p>The information and critical analysis techniques provided in this user-friendly book are invaluable for a range of professionals, including IT personnel, computer engineers, computer security specialists, electrical engineers, software engineers, and industry analysts.</p>
Hardware-based Computer Security Techniques to Defeat Hackers
₹9,424.00
From Biometrics to Quantum Cryptography
This book is currently not in stock. You are pre-ordering this book.