Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Platform Embedded Security Technology Revealed: Safeguarding the Future of Computing with Intel Embedded Security and Management Engine

Buy

Platform Embedded Security Technology Revealed is an in-depth introduction to Intel’s platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects applications’ secrets and users’ privacy in a secure, light-weight, and inexpensive way. Besides native built-in features, it allows third-party software vendors to develop applications that take advantage of the security infrastructures offered by the engine.

Intel’s security and management engine is technologically unique and significant, but is largely unknown to many members of the tech communities who could potentially benefit from it. Platform Embedded Security Technology Revealed reveals technical details of the engine. The engine provides a new way for the computer security industry to resolve critical problems resulting from booming mobile technologies, such as increasing threats against confidentiality and privacy. This book describes how this advanced level of protection is made possible by the engine, how it can improve users’ security experience, and how third-party vendors can make use of it.

It's written for computer security professionals and researchers; embedded system engineers; and software engineers and vendors who are interested in developing new security applications on top of Intel’s security and management engine.

It’s also written for advanced users who are interested in understanding how the security features of Intel’s platforms work.

What you’ll learn

  • The cyber security challenges behind the creation of the embedded security and management engine, and the solutions it presents
  • The pros and cons of enforcing security in the embedded engine
  • Basic cryptography and security infrastructure of the engine
  • Security-hardening features of the engine
  • Handling dynamically loaded applications
  • How anonymous authentication works with enhanced privacy protection
  • Content protection at the hardware level
  • Secure boot with a hardware root of trust
  • Firmware-based TPM
  • Identity protection with a hardware-based, one-time password

Who this book is for

Computer security professionals and researchers; embedded system engineers; software engineers and vendors who are interested in developing new security applications on top of Intel’s security and management engine; OEM (such as Lenovo, HP, etc.) marketing and R&D staff.

Table of Contents

  1. Cyber Security in the Mobile Age
  2. Intel’s Embedded Solutions: from Management to Security
  3. Building Blocks of the Security and Management Engine
  4. The Engine: Safeguarding Itself before Safeguarding Others
  5. Your Privacy at the Next Level with Intel's Enhanced Privacy Identification (EPID) Technology
  6. Boot with Integrity, or Don’t Boot
  7. Trust Computing, Backed by Intel's Firmware-Based TPM
  8. Unleashing Premium Entertainment with Hardware-Based Content Protection Technology
  9. Breaking the Boundaries with Dynamically Loaded Applications
  10. Intel Identity Protection Technology: the Robust, Convenient, and Cost-Effective Way to Deter Identity Theft
  11. Looking Ahead: Tomorrow's Innovations Built on Today's Foundation
(HTML tags aren't allowed.)

Vegetable Bliss: Simple Seed to Table Inspiration
Vegetable Bliss: Simple Seed to Table Inspiration

vegetable bliss [vej-tuh-buhl blis], n. 1. extreme enjoyment and ecstasy when preparing and eating locally grown vegetables. 2. intense pleasure and satisfaction when selecting veggies from farmer's markets, community-supported farms or your own gar

...
Smart Is the New Rich: If You Can't Afford It, Put It Down
Smart Is the New Rich: If You Can't Afford It, Put It Down

A practical way to think about money today

Author and CNN veteran money correspondent Christine Romans believes we should live by three qualifiers: living within our means, living with less debt, and being less vulnerable. While some may say this is old-fashioned, today it's hard to argue with Romans' view.

...

Formulation tools for Pharmaceutical Development (Woodhead Publishing Series in Biomedicine)
Formulation tools for Pharmaceutical Development (Woodhead Publishing Series in Biomedicine)

A range of new and innovative tools used for preformulation and formulation of medicines help optimize pharmaceutical development projects. Such tools also assist with the performance evaluation of the pharmaceutical process, allowing any potential gaps to be identified. These tools can be applied in both basic research and industrial...


Expert Apache Cassandra Administration
Expert Apache Cassandra Administration
Follow this handbook to build, configure, tune, and secure Apache Cassandra databases. Start with the installation of Cassandra and move on to the creation of a single instance, and then a cluster of Cassandra databases.

Cassandra is increasingly a key player in many big data environments, and this book shows you
...
Qt 4
Qt 4
A number of years ago, I happened to come across an article on GUI programming with C++. I had just started learning C++ and was amazed at how little code the author2 needed to produce a complete game, including the menus. Of course, there were a number of constructs that needed explanation, but after a short time I was hooked:...
Microsoft Office FrontPage 2003 Inside Out
Microsoft Office FrontPage 2003 Inside Out

Hey, you know your way around the Web—so now dig into FrontPage 2003 and really put your Web design skills to work! This supremely organized reference packs hundreds of time-saving solutions, troubleshooting tips, and handy workarounds in concise, fast answer format. Quickly advance your expertise by drilling deep into core and advanced...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy