000 03802nam a22005175i 4500
001 978-1-4302-6572-6
003 DE-He213
005 20210511120210.0
007 cr nn 008mamaa
008 140828s2014 xxu| s |||| 0|eng d
020 _a9781430265726
_9978-1-4302-6572-6
024 7 _a10.1007/978-1-4302-6572-6
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
082 0 4 _a005.8
_223
100 1 _aRuan, Xiaoyu.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_93908
245 1 0 _aPlatform Embedded Security Technology Revealed
_h[electronic resource] :
_bSafeguarding the Future of Computing with Intel Embedded Security and Management Engine /
_cby Xiaoyu Ruan.
250 _a1st ed. 2014.
264 1 _aBerkeley, CA :
_bApress :
_bImprint: Apress,
_c2014.
300 _aXX, 272 p. 74 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
506 0 _aOpen Access
520 _aPlatform Embedded Security Technology Revealed is an in-depth introduction to Intel’s platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects applications’ secrets and users’ privacy in a secure, light-weight, and inexpensive way. Besides native built-in features, it allows third-party software vendors to develop applications that take advantage of the security infrastructures offered by the engine. Intel’s security and management engine is technologically unique and significant, but is largely unknown to many members of the tech communities who could potentially benefit from it. Platform Embedded Security Technology Revealed reveals technical details of the engine. The engine provides a new way for the computer security industry to resolve critical problems resulting from booming mobile technologies, such as increasing threats against confidentiality and privacy. This book describes how this advanced level of protection is made possible by the engine, how it can improve users’ security experience, and how third-party vendors can make use of it. It's written for computer security professionals and researchers; embedded system engineers; and software engineers and vendors who are interested in developing new security applications on top of Intel’s security and management engine. It’s also written for advanced users who are interested in understanding how the security features of Intel’s platforms work.
650 0 _aData protection.
_9210
650 0 _aData encryption (Computer science).
_92579
650 0 _aSoftware engineering.
_93909
650 1 4 _aSecurity.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I28000
_9215
650 2 4 _aCryptology.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I28020
_92580
650 2 4 _aSoftware Engineering/Programming and Operating Systems.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I14002
_9891
710 2 _aSpringerLink (Online service)
_9141
776 0 8 _iPrinted edition:
_z9781430265719
776 0 8 _iPrinted edition:
_z9781430265733
856 4 0 _uhttps://doi.org/10.1007/978-1-4302-6572-6
912 _aZDB-2-CWD
912 _aZDB-2-SXPC
912 _aZDB-2-SOB
942 _cEBK
_w1
_xAdministrator Library
_y1
_z Administrator Library
999 _c825
_d825
773 _tSpringer Nature Open Access eBook