Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum CryptographyISBN: 978-0-470-19339-6
Hardcover
256 pages
August 2008
This is a Print-on-Demand title. It will be printed specifically to fill your order. Please allow an additional 10-15 days delivery time. The book is not returnable.
|
1. The Elements of Computer Security.
2. Cryptography Approaches and Attacks.
3. Key Generation and Distribution Approaches and Attacks.
4. The Qualities of Workable Security Solutions.
5. Secure Coprocessors.
6. Secure bootstrap Loading.
7. Secure Memory Management and Trusted Execution Technology.
8. The Trusted Platform Module.
9. Field-Programmable Gate Arrays.
10. Hardware-Based Authentication.
11. A Closer Look At Biometrics.
12. Tokens: Something You Have.
13. Location Technologies.
14. Putting It All Together.
Glossary.
Index.