eBooks-it.org Logo
eBooks-IT.org Inner Image

Hardware-based Computer Security Techniques to Defeat Hackers

From Biometrics to Quantum Cryptography

Hardware-based Computer Security Techniques to Defeat Hackers Image

Book Details:

Publisher:Wiley
Series: Wiley
Author:Roger Dube
Edition:1
ISBN-10:0470193395
ISBN-13:9780470193396
Pages:256
Published:Aug 25 2008
Posted:Nov 19 2014
Language:English
Book format:PDF
Book size:14.7 MB

Book Description:

Presents primary hardware-based computer security approaches in an easy-to-read toolbox formatProtecting valuable personal information against theft is a mission-critical component of today's electronic business community. In an effort to combat this serious and growing problem, the Intelligence and Defense communities have successfully employed the use of hardware-based security devices.This book provides a road map of the hardware-based security devices that can defeatand preventattacks by hackers. Beginning with an overview of the basic elements of computer security, the book covers:CryptographyKey generation and distributionThe qualities of security solutionsSecure co-processorsSecure bootstrap loadingSecure memory management and trusted execution technologyTrusted Platform Module (TPM)Field Programmable Gate Arrays (FPGAs)Hardware-based authentificationBiometricsTokensLocation technologiesHardware-Based Computer Security Techniques to Defeat Hackers includes a chapter devoted entirely to showing readers how they can implement the strategies and technologies discussed. Finally, it concludes with two examples of security systems put into practice.The information and critical analysis techniques provided in this user-friendly book are invaluable for a range of professionals, including IT personnel, computer engineers, computer security specialists, electrical engineers, software engineers, and industry analysts.


Download Link:

Related Books:

Securing the Cloud

Cloud Computer Security Techniques and Tactics
Securing the Cloud Image
As companies turn to burgeoning cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. Securing the Cloud discusses making the move to the cloud while securing your piece of it! The cloud offers flexibility, adaptability, scalability, and in the case of security-resilience. This book details the strengths and weaknesses of securing your company's information with different cloud approaches. Attacks can focus on your infrastructure, communications network, data, or services. The author offers a clear and concise framework to secure your business' assets while making the most of this new technology.Named The 20...

The Myths of Security

What the Computer Security Industry Doesn't Want You to Know
The Myths of Security Image
If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestions for professionals and individuals confronting the issue. Why is security so bad? With many more people online than just a few years ago, there are more attackers -- and they're truly motivated. Attacks are sophisticated, subtle, and harder to detect than ever. But, as Viega notes, few people take the time to understand the situation and protect themselves accordingly. This book tells you:Why it's easier for bad guys to "own" your computer than you think Why a...

Essential Computer Security

Everyone's Guide to Email, Internet, and Wireless Security
Essential Computer Security Image
Essential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselves.Tony Bradley is the Guide for the About.com site for Internet Network Security. In his role managing the content for a site that has over 600,000 page views per month and a weekly newsletter with 25,000 subscribers, Tony has learned how to talk to people, everyday people, about computer security. Intended for the security illiterate, Essential Computer Security is a source of jargon-less advice everyone needs to operate their computer securely. * Written in easy to understand non-technical language that novices can comprehen...



2007 - 2021 © eBooks-IT.org