Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters (Expert's Voice in Security)

Buy

"This book is a must have resource guide for anyone who wants to ...  implement TXT within their environments.  I wish we had this guide when our engineering teams were implementing TXT on our solution platforms!”  

John McAuley,EMC Corporation

"This book details innovative technology that provides significant benefit to both the cloud consumer and the cloud provider when working to meet the ever increasing requirements of trust and control in the cloud.”  

Alex Rodriguez,  Expedient Data Centers

"This book is an invaluable reference for understanding enhanced server security, and how to deploy and leverage computing environment trust to reduce supply chain risk.”  

Pete Nicoletti. Virtustream Inc.

Intel® Trusted Execution Technology (Intel TXT) is a new security technology that started appearing on Intel server platforms in 2010. This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations. This book guides the server administrator / datacenter manager in enabling the technology as well as establishing a launch control policy that he can use to customize the server’s boot process to fit the datacenter’s requirements. This book explains how the OS (typically a Virtual Machine Monitor or Hypervisor) and supporting software can build on the secure facilities afforded by Intel TXT to provide additional security features and functions. It provides examples how the datacenter can create and use trusted pools.

With a foreword from Albert Caballero, the CTO at Trapezoid.

What you’ll learn

  • It explains why TXT is important and the underlying principles (why it is effective).
  • How to enable and provision TXT  
  • How to create a Launch Control Policy. It discusses trade-offs in determining the right policy for the datacenter, and walks the reader through the process for establishing the policy.
  • Demonstrates how to set up and use trusted pools and other advanced concepts such as geo-tagging.
  • It walks the reader through the process of making Intel TXT work for them and understand that TXT is a building block for current and future enhanced security concepts.

Who this book is for

The primary audience is the Datacenter Manager and members of an IT organization. It will be valuable to executives that need to understand enhanced server security and will provide a guide to OSVs and ISVs not only to understand the application of TXT but also the new opportunities that TXT enables and ways that the OS and applications can take advantage of those new capabilities. This book applies to cloud computing since TXT can be used to provide additional security for both public and private clouds.

Table of Contents

  1. Introduction
  2. Principals of TXT
  3. TXT Provisioning
  4. Launch Control Policy
  5. Opportunities for the OSV and ISVs
  6. Creating a More Secure Data Center
  7. Trusted Pools and Cloud Compliance Support
  8. Appendix
(HTML tags aren't allowed.)

Fixing Access Annoyances : How to Fix the Most Annoying Things About Your Favorite Database
Fixing Access Annoyances : How to Fix the Most Annoying Things About Your Favorite Database

When an application is part of the Microsoft Office suite, it's sure to be a leader in its field. In the realm of desktop database management, Access is top dog with millions of users. But this is one dog that can bite. Although Access is a powerful, relational tool with the fetching talents of a Labrador, it's not an easy beast...

Processing for Android: Create Mobile, Sensor-Aware, and VR Applications Using Processing
Processing for Android: Create Mobile, Sensor-Aware, and VR Applications Using Processing
Learn how to use the Processing programming language and environment to create Android applications with ease. This book covers the basics of the Processing language, allowing users to effectively program interactive graphics in 2D and 3D. It  also details the application of these techniques to different types of Android devices...
Windows Admin Scripting Little Black Book, Second Edition
Windows Admin Scripting Little Black Book, Second Edition
This book shows Windows XP and 2003 users and administrators how to perform Windows management and administrative tasks using powerful scripts for just about every important task imaginable.

Windows Admin Scripting Little Black Book, 2nd Edition, shows Windows XP and 2003 users and administrators how to perform Windows management...


Macromedia Studio 8 All-in-One Desk Reference For Dummies (Computer/Tech)
Macromedia Studio 8 All-in-One Desk Reference For Dummies (Computer/Tech)

Your one-stop guide to six great Macromedia tools for building Web sites

It's like a Web-site-in-a-book! First, there's some Web site insight to help you decide what you want your site to do. Then it's into the nitty-gritty of making it happen — building with Dreamweaver, adding animation with Flash, enabling collaboration...

Pinnacle Studio 9 Ignite!
Pinnacle Studio 9 Ignite!
Covering the popular video editing and DVD authoring software that is used by 3.5 million users, "Pinnacle Studio 9 Ignite!" is a visual guide that will have you up and running in no time. With the many enhancements of Pinnacle Studio 9, this book is not only suitable for beginners, but also for users of Pinnacle looking to brush up on...
ASP.NET MVC 1.0 Quickly
ASP.NET MVC 1.0 Quickly
The book walks through the main concepts of the MVC framework to help ASP.NET developers to move on to a higher level. It includes clear instructions and lots of code examples. It takes a simple approach, thereby allowing you to work with all facets of web application development: requirements, designing, testing, and deployment. This book is for...
©2020 LearnIT (support@pdfchm.net) - Privacy Policy