Chapter 1
Introduction to Trusted Computing
This book is designed to provide the reader with a practical understanding of how to use the new embedded security subsystem built into many computers: TCG (Trusted Computing Group)’s Trusted Platform Module (TPM). The book does not limit itself to a mere description of the capabilities of the TPM and the standard Application Programming Interfaces (APIs). Through multiple examples, it provides the reader with an understanding of what problems the TPM can be used to solve, and the motivation behind the design decisions made in the specifications. After reading this book, the reader should better understand the security problems facing PC clients today—and how to use the capabilities of a TPM, via the ...
Get A Practical Guide to Trusted Computing now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.