The elements of computer security -- Cryptography approaches and attacks -- Key generation and distribution approaches and attacks -- The qualities of workable security solutions -- Secure coprocessors -- Secure bootstrap loading -- Secure memory management and trusted execution technology -- The trusted platform module -- Field-programmable gate arrays -- Hardware-based authentication -- A closer look at biometrics -- Tokens: something you have -- Location technologies -- Putting it all together
Summary
The protection of critical information and systems is a major component of today's electronic business community. This valuable reference presents the primary hardware-based computer security approaches in an easy-to-read toolbox format. The technique