Items related to Hardware-based Computer Security Techniques to Defeat...

Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography - Hardcover

 
9780470193396: Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography

Synopsis

Presents primary hardware-based computer security approaches in an easy-to-read toolbox format

Protecting valuable personal information against theft is a mission-critical component of today's electronic business community. In an effort to combat this serious and growing problem, the Intelligence and Defense communities have successfully employed the use of hardware-based security devices.

This book provides a road map of the hardware-based security devices that can defeat―and prevent―attacks by hackers. Beginning with an overview of the basic elements of computer security, the book covers:

  • Cryptography

  • Key generation and distribution

  • The qualities of security solutions

  • Secure co-processors

  • Secure bootstrap loading

  • Secure memory management and trusted execution technology

  • Trusted Platform Module (TPM)

  • Field Programmable Gate Arrays (FPGAs)

  • Hardware-based authentification

  • Biometrics

  • Tokens

  • Location technologies

Hardware-Based Computer Security Techniques to Defeat Hackers includes a chapter devoted entirely to showing readers how they can implement the strategies and technologies discussed. Finally, it concludes with two examples of security systems put into practice.

The information and critical analysis techniques provided in this user-friendly book are invaluable for a range of professionals, including IT personnel, computer engineers, computer security specialists, electrical engineers, software engineers, and industry analysts.

"synopsis" may belong to another edition of this title.

About the Author

Roger R. Dube, PhD, obtained his bachelor's degree in experimental physics from Cornell University and his PhD from Princeton University. He has held positions in both academia and the private sector. He has published in top peer-reviewed scientific publications and written numerous successful research and development proposals (securing in excess of $27 million in grants and contract vehicles since 2004). He is currently the President and Chief Scientist of Digital Authentication Technologies (DAT), a computer security company with products based on Dr. Dube's patents. The technology has been successfully field-tested and deployed at the U.S. Joint Forces Command in Norfolk, Virginia, as well as at SAIC and Criterion Labs, and is currently being considered for use by various industries worldwide. Dr. Dube also holds a joint position at Rochester Institute of Techology (RIT) as a Professor in the Center for Imaging Science.

From the Back Cover

Presents primary hardware-based computer security approaches in an easy-to-read toolbox format

Protecting valuable personal information against theft is a mission-critical component of today's electronic business community. In an effort to combat this serious and growing problem, the Intelligence and Defense communities have successfully employed the use of hardware-based security devices.

This book provides a road map of the hardware-based security devices that can defeat―and prevent―attacks by hackers. Beginning with an overview of the basic elements of computer security, the book covers:

  • Cryptography

  • Key generation and distribution

  • The qualities of security solutions

  • Secure co-processors

  • Secure bootstrap loading

  • Secure memory management and trusted execution technology

  • Trusted Platform Module (TPM)

  • Field Programmable Gate Arrays (FPGAs)

  • Hardware-based authentification

  • Biometrics

  • Tokens

  • Location technologies

Hardware-Based Computer Security Techniques to Defeat Hackers includes a chapter devoted entirely to showing readers how they can implement the strategies and technologies discussed. Finally, it concludes with two examples of security systems put into practice.

The information and critical analysis techniques provided in this user-friendly book are invaluable for a range of professionals, including IT personnel, computer engineers, computer security specialists, electrical engineers, software engineers, and industry analysts.

From the Inside Flap

Presents primary hardware-based computer security approaches in an easy-to-read toolbox format

Protecting valuable personal information against theft is a mission-critical component of today's electronic business community. In an effort to combat this serious and growing problem, the Intelligence and Defense communities have successfully employed the use of hardware-based security devices.

This book provides a road map of the hardware-based security devices that can defeat—and prevent—attacks by hackers. Beginning with an overview of the basic elements of computer security, the book covers:

  • Cryptography

  • Key generation and distribution

  • The qualities of security solutions

  • Secure co-processors

  • Secure bootstrap loading

  • Secure memory management and trusted execution technology

  • Trusted Platform Module (TPM)

  • Field Programmable Gate Arrays (FPGAs)

  • Hardware-based authentification

  • Biometrics

  • Tokens

  • Location technologies

Hardware-Based Computer Security Techniques to Defeat Hackers includes a chapter devoted entirely to showing readers how they can implement the strategies and technologies discussed. Finally, it concludes with two examples of security systems put into practice.

The information and critical analysis techniques provided in this user-friendly book are invaluable for a range of professionals, including IT personnel, computer engineers, computer security specialists, electrical engineers, software engineers, and industry analysts.

"About this title" may belong to another edition of this title.

  • PublisherWiley
  • Publication date2008
  • ISBN 10 0470193395
  • ISBN 13 9780470193396
  • BindingHardcover
  • LanguageEnglish
  • Edition number1
  • Number of pages256

Buy Used

Condition: As New
Unread book in perfect condition...
View this item

US$ 2.64 shipping within U.S.A.

Destination, rates & speeds

Search results for Hardware-based Computer Security Techniques to Defeat...

Seller Image

Dube, Roger R.
Published by Wiley, 2008
ISBN 10: 0470193395 ISBN 13: 9780470193396
New Hardcover

Seller: GreatBookPrices, Columbia, MD, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Condition: New. Seller Inventory # 5197784-n

Contact seller

Buy New

US$ 136.36
Convert currency
Shipping: US$ 2.64
Within U.S.A.
Destination, rates & speeds

Quantity: Over 20 available

Add to basket

Stock Image

Dube, Roger R.
Published by Wiley, 2008
ISBN 10: 0470193395 ISBN 13: 9780470193396
New Hardcover

Seller: Lucky's Textbooks, Dallas, TX, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Condition: New. Seller Inventory # ABLIING23Feb2215580219262

Contact seller

Buy New

US$ 135.02
Convert currency
Shipping: US$ 3.99
Within U.S.A.
Destination, rates & speeds

Quantity: Over 20 available

Add to basket

Stock Image

RR Dube
Published by Wiley-Blackwell, 2008
ISBN 10: 0470193395 ISBN 13: 9780470193396
New Hardcover

Seller: PBShop.store UK, Fairford, GLOS, United Kingdom

Seller rating 4 out of 5 stars 4-star rating, Learn more about seller ratings

HRD. Condition: New. New Book. Shipped from UK. Established seller since 2000. Seller Inventory # FW-9780470193396

Contact seller

Buy New

US$ 136.98
Convert currency
Shipping: US$ 5.60
From United Kingdom to U.S.A.
Destination, rates & speeds

Quantity: 15 available

Add to basket

Seller Image

Dube, Roger R.
Published by Wiley, 2008
ISBN 10: 0470193395 ISBN 13: 9780470193396
Used Hardcover

Seller: GreatBookPrices, Columbia, MD, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Condition: As New. Unread book in perfect condition. Seller Inventory # 5197784

Contact seller

Buy Used

US$ 143.16
Convert currency
Shipping: US$ 2.64
Within U.S.A.
Destination, rates & speeds

Quantity: Over 20 available

Add to basket

Seller Image

Dube, Roger R.
Published by Wiley, 2008
ISBN 10: 0470193395 ISBN 13: 9780470193396
New Hardcover

Seller: GreatBookPricesUK, Woodford Green, United Kingdom

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Condition: New. Seller Inventory # 5197784-n

Contact seller

Buy New

US$ 136.96
Convert currency
Shipping: US$ 20.19
From United Kingdom to U.S.A.
Destination, rates & speeds

Quantity: Over 20 available

Add to basket

Stock Image

Roger R. Dube
Published by John Wiley & Sons Inc, New York, 2008
ISBN 10: 0470193395 ISBN 13: 9780470193396
New Hardcover First Edition

Seller: Grand Eagle Retail, Fairfield, OH, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Hardcover. Condition: new. Hardcover. Presents primary hardware-based computer security approaches in an easy-to-read toolbox format Protecting valuable personal information against theft is a mission-critical component of today's electronic business community. In an effort to combat this serious and growing problem, the Intelligence and Defense communities have successfully employed the use of hardware-based security devices. This book provides a road map of the hardware-based security devices that can defeatand preventattacks by hackers. Beginning with an overview of the basic elements of computer security, the book covers: Cryptography Key generation and distribution The qualities of security solutions Secure co-processors Secure bootstrap loading Secure memory management and trusted execution technology Trusted Platform Module (TPM) Field Programmable Gate Arrays (FPGAs) Hardware-based authentification Biometrics Tokens Location technologies Hardware-Based Computer Security Techniques to Defeat Hackers includes a chapter devoted entirely to showing readers how they can implement the strategies and technologies discussed. Finally, it concludes with two examples of security systems put into practice. The information and critical analysis techniques provided in this user-friendly book are invaluable for a range of professionals, including IT personnel, computer engineers, computer security specialists, electrical engineers, software engineers, and industry analysts. Presents the primary hardware-based computer security approaches in an easy to read format. Provides comprehensive coverage of the primary hardware-based computer security approaches in a single, easy to use reference. Establishes a toolbox of core security issues of different approaches. Shipping may be from multiple locations in the US or from the UK, depending on stock availability. Seller Inventory # 9780470193396

Contact seller

Buy New

US$ 162.36
Convert currency
Shipping: FREE
Within U.S.A.
Destination, rates & speeds

Quantity: 1 available

Add to basket

Seller Image

Dube, Roger R.
Published by Wiley, 2008
ISBN 10: 0470193395 ISBN 13: 9780470193396
Used Hardcover

Seller: GreatBookPricesUK, Woodford Green, United Kingdom

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Condition: As New. Unread book in perfect condition. Seller Inventory # 5197784

Contact seller

Buy Used

US$ 149.91
Convert currency
Shipping: US$ 20.19
From United Kingdom to U.S.A.
Destination, rates & speeds

Quantity: Over 20 available

Add to basket

Stock Image

Dube Roger Dube Roger R.
Published by John Wiley & Sons, 2008
ISBN 10: 0470193395 ISBN 13: 9780470193396
New Hardcover

Seller: Majestic Books, Hounslow, United Kingdom

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Condition: New. pp. xxiii + 227 Illus. Seller Inventory # 7493110

Contact seller

Buy New

US$ 171.09
Convert currency
Shipping: US$ 8.75
From United Kingdom to U.S.A.
Destination, rates & speeds

Quantity: 3 available

Add to basket

Stock Image

Dube, Roger R.
Published by Wiley, 2008
ISBN 10: 0470193395 ISBN 13: 9780470193396
New Hardcover

Seller: Ria Christie Collections, Uxbridge, United Kingdom

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Condition: New. In. Seller Inventory # ria9780470193396_new

Contact seller

Buy New

US$ 165.52
Convert currency
Shipping: US$ 16.12
From United Kingdom to U.S.A.
Destination, rates & speeds

Quantity: Over 20 available

Add to basket

Stock Image

Roger R. Dube
Published by John Wiley & Sons Inc, 2008
ISBN 10: 0470193395 ISBN 13: 9780470193396
New Hardcover

Seller: THE SAINT BOOKSTORE, Southport, United Kingdom

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Hardback. Condition: New. New copy - Usually dispatched within 4 working days. 508. Seller Inventory # B9780470193396

Contact seller

Buy New

US$ 171.37
Convert currency
Shipping: US$ 15.92
From United Kingdom to U.S.A.
Destination, rates & speeds

Quantity: Over 20 available

Add to basket

There are 10 more copies of this book

View all search results for this book