252 15 15MB
English Pages 311 Year 2017
Report DMCA / Copyright
DOWNLOAD EPUB FILE
The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trus
160 49 2MB Read more
How can one trust computation taking place at a remote site, particularly if a party at that site might have motivation
444 17 2MB Read more
In a world driven by technology and data, classical computing faces limitations in tackling complex challenges like clim
121 22 24MB Read more
Use Trusted Computing to Make PCs Safer, More Secure, and More ReliableEvery year, computer security threats become more
349 100 2MB Read more
Book used for BPK 110 at SFU, this book contains introductory level information for nutrition and health. Forcing studen
278 79 10MB Read more
John Wiley & Sons, 2004. - 361 p.Contents Preface General Toxicology A Short Introduction to the Expression Profile
598 102 2MB Read more
755 39 8MB Read more
This book explores how advances in graphic processing units (GPUs), programmable logic devices (TPUs), and field-program
352 90 8MB Read more
199 51 12MB Read more
This book focuses on neuromorphic computing principles and organization and how to build fault-tolerant scalable hardwar
103 23 13MB Read more