pt. I. Background Material -- Ch. 1. Introduction to Trusted Computing -- Ch. 2. Design Goals of the Trusted Platform Module -- Ch. 3. An Overview of the Trusted Platform Module Capabilities -- pt. II. Programming Interfaces to TCG -- Ch. 4. Writing a TPM Device Driver -- Ch. 5. Low-Level Software: Using BIOS and TDDL Directly -- Ch. 6. Trusted Boot -- Ch. 7. The TCG Software Stack -- Ch. 8. Using TPM Keys -- Ch. 9. Using Symmetric Keys -- Ch. 10. The TSS Core Service (TCS) -- Ch. 11. Public Key Cryptography Standard #11 -- pt. III. Architectures -- Ch. 12. Trusted Computing and Secure Storage -- Ch. 13. Trusted Computing and Secure Identification -- Ch. 14. Administration of Trusted Devices -- Ch. 15. Ancillary Hardware -- Ch. 16. Moving from TSS 1.1 to TSS 1.2 -- pt. IV. Appendixes -- App. A. TPM Command Reference -- App. B. TSS Command Reference -- App. C. Function Library -- App. D. TSS Functions Grouped by Object and API Level.
0
Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.