Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography

Buy
The protection of critical information and systems is a major component of today's electronic business community. This valuable reference presents the primary hardware-based computer security approaches in an easy-to-read toolbox format. The techniques discussed show readers how to perform their own evaluation of new and emerging security technologies. It is an invaluable source for computer engineers, computer security specialists, electrical engineers, software engineers, IT professionals, and advanced undergraduate and graduate students in computer engineering and computer science.

Presents primary hardware-based computer security approaches in an easy-to-read toolbox format

Protecting valuable personal information against theft is a mission-critical component of today's electronic business community. In an effort to combat this serious and growing problem, the Intelligence and Defense communities have successfully employed the use of hardware-based security devices.

This book provides a road map of the hardware-based security devices that can defeat—and prevent—attacks by hackers. Beginning with an overview of the basic elements of computer security, the book covers:

  • Cryptography

  • Key generation and distribution

  • The qualities of security solutions

  • Secure co-processors

  • Secure bootstrap loading

  • Secure memory management and trusted execution technology

  • Trusted Platform Module (TPM)

  • Field Programmable Gate Arrays (FPGAs)

  • Hardware-based authentification

  • Biometrics

  • Tokens

  • Location technologies

Hardware-Based Computer Security Techniques to Defeat Hackers includes a chapter devoted entirely to showing readers how they can implement the strategies and technologies discussed. Finally, it concludes with two examples of security systems put into practice.

The information and critical analysis techniques provided in this user-friendly book are invaluable for a range of professionals, including IT personnel, computer engineers, computer security specialists, electrical engineers, software engineers, and industry analysts.

About the Author

Roger R. Dube, PhD, obtained his bachelor's degree in experimental physics from Cornell University and his PhD from Princeton University. He has held positions in both academia and the private sector. He has published in top peer-reviewed scientific publications and written numerous successful research and development proposals (securing in excess of $27 million in grants and contract vehicles since 2004). He is currently the President and Chief Scientist of Digital Authentication Technologies (DAT), a computer security company with products based on Dr. Dube's patents. The technology has been successfully field-tested and deployed at the U.S. Joint Forces Command in Norfolk, Virginia, as well as at SAIC and Criterion Labs, and is currently being considered for use by various industries worldwide. Dr. Dube also holds a joint position at Rochester Institute of Techology (RIT) as a Professor in the Center for Imaging Science.

(HTML tags aren't allowed.)

Pleural Diseases (PLEURAL DISEASES (LIGHT))
Pleural Diseases (PLEURAL DISEASES (LIGHT))

Thoroughly updated for its Fifth Edition, Dr. Light's classic text provides a focused, single-authored perspective on the pathophysiology, clinical manifestations, diagnosis, and management of pleural diseases. This edition has three new chapters on physiological effects of a pneumothorax or pleural effusion, animal models in...

Citrix XenDesktop Cookbook - Third Edition
Citrix XenDesktop Cookbook - Third Edition

Over 40 engaging recipes that will help you implement a full-featured XenDesktop® 7.6 architecture and its main satellite components

About This Book

  • Implement, configure, and optimize the migration from a physical to a VDI architecture using XenDesktop 7.6
  • Publish desktops and...
Simulating Humans: Computer Graphics Animation and Control
Simulating Humans: Computer Graphics Animation and Control

The decade of the 80's saw the dramatic expansion of high performance computer graphics into domains previously able only to irt with the technology. Among the most dramatic has been the incorporation of real-time interactive manipulation and display for human gures. Though actively pur- sued by several research groups, the...


Professional Microsoft SharePoint 2007 Development Using Microsoft Silverlight 2 (Wrox Programmer to Programmer)
Professional Microsoft SharePoint 2007 Development Using Microsoft Silverlight 2 (Wrox Programmer to Programmer)
Silverlight is a cross-browser, cross-platform, and cross-device plug-in for delivering the next generation of .NET-based rich interactive applications (RIAs) for the Web; SharePoint is Microsofts portal development platform and the fastest growing server product at Microsoft. If you are seeking to leverage Silverlight 2.0 to optimize SharePoint...
MySpace for Musicians
MySpace for Musicians
MySpace is one of the most popular websites on the Internet today, with millions of pages of user-generated content. This makes MySpace an ideal tool for musicians interested in promoting their music to the widest possible audience. Many acts have gone from the garage to a recording contract by using MySpace as their launching pad. MySpace for...
Learning Modernizr
Learning Modernizr

Modern web browsers support a whole range of new HTML5 and CSS3 features that make web development fun. But supporting old browsers can make a web developer's life difficult. With HTML5 Modernizr, you can check for features and deliver a design around them that is not only backward, but also forward compatible.

"Learning...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy