Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters
Intel® Trusted Execution Technology (Intel TXT) is a new security technology that started appearing on Intel server platforms in 2010. This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations. This book guides the server administrator /...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Electronic Book Chapter |
Language: | English |
Published: |
Apress
2013
|
Online Access: | DOAB: download the publication DOAB: description of the publication |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000naaaa2200000uu 4500 | ||
---|---|---|---|
001 | doab_20_500_12854_50408 | ||
005 | 20210211 | ||
003 | oapen | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20210211s2013 xx |||||o ||| 0|eng d | ||
020 | |a /doi.org/10.1007/978-1-4302-6149-0 | ||
020 | |a 9781430261483 | ||
020 | |a 9781430261490 | ||
040 | |a oapen |c oapen | ||
024 | 7 | |a https://doi.org/10.1007/978-1-4302-6149-0 |c doi | |
041 | 0 | |a eng | |
042 | |a dc | ||
100 | 1 | |a William Futral |4 auth | |
700 | 1 | |a James Greene |4 auth | |
245 | 1 | 0 | |a Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters |
260 | |b Apress |c 2013 | ||
300 | |a 1 electronic resource (156 p.) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
506 | 0 | |a Open Access |2 star |f Unrestricted online access | |
520 | |a Intel® Trusted Execution Technology (Intel TXT) is a new security technology that started appearing on Intel server platforms in 2010. This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations. This book guides the server administrator / datacenter manager in enabling the technology as well as establishing a launch control policy that he can use to customize the server's boot process to fit the datacenter's requirements. This book explains how the OS (typically a Virtual Machine Monitor or Hypervisor) and supporting software can build on the secure facilities afforded by Intel TXT to provide additional security features and functions. It provides examples how the datacenter can create and use trusted pools. | ||
536 | |a Intel | ||
540 | |a Creative Commons |f https://creativecommons.org/licenses/by-nc-nd/4.0/ |2 cc |4 https://creativecommons.org/licenses/by-nc-nd/4.0/ | ||
546 | |a English | ||
856 | 4 | 0 | |a www.oapen.org |u https://link.springer.com/book/10.1007/978-1-4302-6149-0 |7 0 |z DOAB: download the publication |
856 | 4 | 0 | |a www.oapen.org |u https://directory.doabooks.org/handle/20.500.12854/50408 |7 0 |z DOAB: description of the publication |