Platform Embedded Security Technology Revealed

Safeguarding the Future of Computing with Intel Embedded Security and Management Engine



Bookstore > Books > Platform Embedded Security Technology Revealed

Platform Embedded Security Technology Revealed
Free Download
Buy
Preview
Price$39.99 - $45.38
eBookFree
Rating
AuthorXiaoyu Ruan
PublisherApress
Published2014
Pages272
LanguageEnglish
FormatPaper book / ebook (PDF)
ISBN-10143026571X
ISBN-139781430265719
EBook Hardcover Paperback

Platform Embedded Security Technology Revealed is an in-depth introduction to Intel's platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects applications' secrets and users' privacy in a secure, light-weight, and inexpensive way. Besides native built-in features, it allows third-party software vendors to develop applications that take advantage of the security infrastructures offered by the engine.

Intel's security and management engine is technologically unique and significant, but is largely unknown to many members of the tech communities who could potentially benefit from it. Platform Embedded Security Technology Revealed reveals technical details of the engine.





3 5 10

Similar Books


Intel Trusted Execution Technology for Server Platforms

Intel Trusted Execution Technology for Server Platforms

by William Futral, James Greene

Intel Trusted Execution Technology (Intel TXT) is a new security technology that started appearing on Intel server platforms in 2010. This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations. This book guides the server administrator / datacenter manager in enabling the techn...

Price:  $37.49  |  Publisher:  Apress  |  Release:  2013

Security Intelligence

Security Intelligence

by Qing Li, Gregory Clark

Similar to unraveling a math word problem, Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges guides you through a deciphering process that translates each security goal into a set of security variables, substitutes each variable with a specific security technology domain, formulates the equation that ...

Price:  $49.80  |  Publisher:  Wiley  |  Release:  2015

Pro Linux Embedded Systems

Pro Linux Embedded Systems

by Gene Sally

Today, Linux is included with nearly every embedded platform. Embedded developers can take a more modern route and spend more time tuning Linux and taking advantage of open source code to build more robust, feature-rich applications. While Gene Sally does not neglect porting Linux to new hardware, modern embedded hardware is more sophisti...

Price:  $37.62  |  Publisher:  Apress  |  Release:  2009

Learning iOS Security

Learning iOS Security

by Allister Banks, Charles S. Edge

iOS has quickly become one of the most popular mobile operating systems, not only with users, but also with developers and companies. This also makes it a popular platform for malicious adversaries. iOS users and developers need to be constantly aware of their mobile security risks. Because of this, there is great demand for risk assessme...

Price:  $14.99  |  Publisher:  Packt Publishing  |  Release:  2015

Hacking Exposed Mobile

Hacking Exposed Mobile

by Neil Bergman, Mike Stanfield, Jason Rouse, Joel Scambray, Sarath Geethakumar, Swapnil Deshmukh, Scott Matsumoto, John Steven, Mike Price

Hacking Exposed Mobile continues in the great tradition of the Hacking Exposed series, arming business leaders and technology practitioners with an in-depth understanding of the latest attacks and countermeasures - so they can leverage the power of mobile platforms while ensuring that security risks are contained.Identify and evade key th...

Price:  $32.99  |  Publisher:  McGraw-Hill  |  Release:  2013

Hacking Exposed Malware & Rootkits, 2nd Edition

Hacking Exposed Malware & Rootkits, 2nd Edition

by Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters

Thwart debilitating cyber-attacks and dramatically improve your organization's security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker's latest methods alongside ready-to-deploy countermeasures. D...

Price:  $22.94  |  Publisher:  McGraw-Hill  |  Release:  2016

Beautiful Security

Beautiful Security

by Andy Oram, John Viega

In Beautiful Security, today's security experts offer a collection of essays that describe bold and extraordinary methods to secure computer systems in the face of ever-increasing threats. You'll learn how new and more aggressive security measures work -- and where they will lead us. This far-reaching discussion takes you into the techniq...

Price:  $31.99  |  Publisher:  O'Reilly Media  |  Release:  2009

Healthcare Information Technology Exam Guide, 2nd Edition

Healthcare Information Technology Exam Guide, 2nd Edition

by Kathleen A. McCormick, Brian Gugerty, John E. Mattison

Gain the skills and knowledge required to implement and support healthcare IT (HIT) systems in various clinical and healthcare business settings. Health Information Technology Exam Guide for CHTS and CAHIMS Certifications prepares IT professionals to transition into HIT with coverage of topics ranging from health data standards to project...

Price:  $30.97  |  Publisher:  McGraw-Hill  |  Release:  2017