買這商品的人也買了...
-
C# 精要 (C# Essentials)$480$379 -
深入淺出設計模式 (Head First Design Patterns)$880$695 -
Microsoft ADO.NET 3.5 精研講座$850$672 -
Canon EOS 數位單眼 RAW 相片編修完全解析$350$315 -
電腦網際網路 (Computer Networking: A Top-Down Approach, 4/e)$650$585 -
Flash ActionScript 3 殿堂之路$520$411 -
深入淺出 JavaScript (Head First JavaScript)$880$695 -
精通 Windows API 函數、介面、程式設計實例$640$506 -
Java 程式設計藝術 (Java How to Program, 7/e)$450$405 -
LINQ 入門及應用$500$425 -
Silverlight 範例權威講座-Silverlight 3 加強版$540$459 -
MCTS 70-640 Windows Server 2008 Active Directory Configuration 專業認證手冊 (MCTS: Windows Server 2008 Active Directory Configuration (Exam 70-640))$680$537 -
程式設計師的自我修養-連結、載入、程式庫$580$493 -
Windows Server 2008 R2 虛擬化技術 Hyper-V R2$680$537 -
Google Android SDK 開發範例大全 2$890$703 -
雲端運算大解密$520$416 -
易讀程式之美學-提升程式碼可讀性的簡單法則 (The Art of Readable Code)$480$408 -
SQL Server 效能調校$450$351 -
物件導向設計模式-可再利用物件導向軟體之要素 (精裝典藏版) (Design Patterns: Elements of Reusable Object-Oriented Software)$550$550 -
Python 程式設計入門 (適用於 2.x 與 3.x 版)$620$484 -
Make: 感測器|運用 Arduino 和 Raspberry Pi 感測的專題與實驗(Make: Sensors: A Hands-On Primer for Monitoring the Real World with Arduino and Raspberry Pi)$580$458 -
當猛虎遇上Android | 一手掌握Android App程式開發與設計$880$695 -
黑帽 Python | 給駭客與滲透測試者的 Python 開發指南 (Black Hat Python: Python Programming for Hackers and Pentesters)$400$316 -
實戰 Webduino:物聯網開發 x 智慧家居應用 x 自走車$450$383 -
網站入侵現場鑑證實錄$380$300
商品描述
Protecting valuable personal information against theft is a mission-critical component of today's electronic business community. In an effort to combat this serious and growing problem, the Intelligence and Defense communities have successfully employed the use of hardware-based security devices.
This book provides a road map of the hardware-based security devices that can defeat—and prevent—attacks by hackers. Beginning with an overview of the basic elements of computer security, the book covers:
-
Cryptography
-
Key generation and distribution
-
The qualities of security solutions
-
Secure co-processors
-
Secure bootstrap loading
-
Secure memory management and trusted execution technology
-
Trusted Platform Module (TPM)
-
Field Programmable Gate Arrays (FPGAs)
-
Hardware-based authentification
-
Biometrics
-
Tokens
-
Location technologies
Hardware-Based Computer Security Techniques to Defeat Hackers includes a chapter devoted entirely to showing readers how they can implement the strategies and technologies discussed. Finally, it concludes with two examples of security systems put into practice.
The information and critical analysis techniques provided in this user-friendly book are invaluable for a range of professionals, including IT personnel, computer engineers, computer security specialists, electrical engineers, software engineers, and industry analysts.
商品描述(中文翻譯)
本書以易於閱讀的工具箱格式介紹主要的硬體基礎電腦安全方法
保護寶貴的個人資訊免受盜竊是當今電子商務社群中的一個關鍵任務。為了應對這一嚴重且日益增長的問題,情報和國防社群成功地採用了硬體基礎的安全設備。
本書提供了一個硬體基礎安全設備的路線圖,這些設備可以擊敗並防止駭客的攻擊。書中首先概述了電腦安全的基本要素,然後涵蓋以下內容:
- 密碼學
- 金鑰生成與分發
- 安全解決方案的特性
- 安全共同處理器
- 安全啟動加載
- 安全記憶體管理與可信執行技術
- 可信平台模組 (TPM)
- 現場可編程閘陣列 (FPGAs)
- 硬體基礎身份驗證
- 生物識別技術
- 令牌
- 位置技術
《硬體基礎電腦安全技術以擊敗駭客》包含一章專門展示讀者如何實施所討論的策略和技術。最後,書中以兩個實際應用的安全系統範例作結。
本書提供的信息和關鍵分析技術對於各類專業人士來說都是無價的,包括 IT 人員、電腦工程師、電腦安全專家、電機工程師、軟體工程師和行業分析師。
