1
2
3
by Futral, William.
Published 2013
Format:
Table of Contents: ... ? -- Types of Attacks -- What Is Trust? How Can Hardware Help? -- What Is IntelĀ® Trusted Execution Technology...
Click to View
4
5
6
by Nayak, Umesha.
Published 2014
Format:
Table of Contents: ... -- Introduction -- Confidentiality and Data Integrity -- Who Can Access the Data? -- What is an Access Control...
Click to View
7
by Fleischmann, Albert.
Published 2015
Format:
Table of Contents: ....2.3 The IT Experts -- 5.3 A Sample Project: Managed Service Hardware (IT-Supported Process Introduction) -- 5...
Click to View