Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum CryptographyISBN: 978-0-470-19339-6
Hardcover
256 pages
September 2008
![]() Other Available Formats: E-book
|
1. The Elements of Computer Security.
2. Cryptography Approaches and Attacks.
3. Key Generation and Distribution Approaches and Attacks.
4. The Qualities of Workable Security Solutions.
5. Secure Coprocessors.
6. Secure bootstrap Loading.
7. Secure Memory Management and Trusted Execution Technology.
8. The Trusted Platform Module.
9. Field-Programmable Gate Arrays.
10. Hardware-Based Authentication.
11. A Closer Look At Biometrics.
12. Tokens: Something You Have.
13. Location Technologies.
14. Putting It All Together.
Glossary.
Index.