Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Introduction to confidential computing = a comprehensive guide to understanding and exploring confidential computing /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Introduction to confidential computing / R Praveenraj, Krishna Desai.
Reminder of title:
a comprehensive guide to understanding and exploring confidential computing /
Author:
Praveenraj, R.
other author:
Desai, Krishna,
Description:
1 online resource (228 pages)
Subject:
COMPUTERS / Security / General. -
Online resource:
https://portal.igpublish.com/iglibrary/search/BPB0000686.html
ISBN:
9789365891522
Introduction to confidential computing = a comprehensive guide to understanding and exploring confidential computing /
Praveenraj, R.
Introduction to confidential computing
a comprehensive guide to understanding and exploring confidential computing /[electronic resource] :R Praveenraj, Krishna Desai. - 1 online resource (228 pages)
Includes bibliographical references and index.
Introduction to confidential computing : a comprehensive guide to understanding and exploring confidential computing -- About the Authors -- About the Reviewer -- Acknowledgements -- Preface -- Coloured Images -- Table of Contents -- 1. Vital Need for Confidential Computing -- 2. Trusted Execution Environments -- 3. Secure Application Development -- 4. Remote Attestation -- 5. Confidential Computing in Cloud -- 6. Confidential Artificial Intelligence -- 7. Prospects of Confidential Computing -- Appendix A: Enclave Initialization Instructions in Intel SGX -- Appendix B: Intel TDX Architectural Instructions -- Appendix C: Secure Boot Infrastructure Terminologies -- Index.
Access restricted to authorized users and institutions.
In an age where data breaches and privacy issues are growing, confidential computing offers a state-of-the-art solution. This technology helps organizations keep their most sensitive information safe, even against strong threats. Introduction to Confidential Computing provides a clear guide to this advanced cybersecurity technology. It explains why confidential computing is crucial for protecting sensitive data, covering key technologies, architectures, and frameworks. The book details remote attestation, which ensures computing environment integrity, and explores how confidential computing enhances AI training security. It also reviews solutions from major cloud providers, helping readers choose the right options. This book is perfect for anyone looking to boost their cybersecurity skills and stay ahead in data protection. By the end of this book, you will gain a thorough understanding of confidential computing and its impact on data security and privacy. You will be ready to assess and implement confidential computing solutions, safeguarding your organization's assets and meeting data privacy regulations. KEY FEATURES Comprehensive overview of confidential computing architectures and technologies. Guidance on leveraging confidential computing technologies for secure data processing and privacy protection. Learn how confidential computing ensures data privacy and protects AI model integrity through secure processing. WHAT YOU WILL LEARN Learn why confidential computing is crucial in today's digital world. Understand high-level architecture of various trusted execution environments implementations. Art of developing secure applications that can be deployed on TEE. Comprehend how remote attestation ensures the integrity of computing environments. Discover how RA-TLS could reshape the future of secure communications. Explore how confidential computing protects data and AI models. WHO THIS BOOK IS FOR This book is for software architects, security researchers, and developers to enhance application security using confidential computing. PhD candidates and postgraduates will explore TEEs, while AI/ML developers will understand how confidential AI protects data and models.
Mode of access: World Wide Web.
ISBN: 9789365891522Subjects--Topical Terms:
1483863
COMPUTERS / Security / General.
Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Introduction to confidential computing = a comprehensive guide to understanding and exploring confidential computing /
LDR
:03984nam a2200289 i 4500
001
1157341
006
m eo d
007
cr cn |||m|||a
008
250717s2024 ob 000 0 eng d
020
$a
9789365891522
020
$a
9789365892147
035
$a
BPB0000686
041
0 #
$a
eng
050
0 0
$a
QA76.9.A25
082
0 0
$a
005.8
100
1
$a
Praveenraj, R.
$3
1483953
245
1 0
$a
Introduction to confidential computing
$b
a comprehensive guide to understanding and exploring confidential computing /
$c
R Praveenraj, Krishna Desai.
$h
[electronic resource] :
264
1
$a
[Place of publication not identified] :
$b
BPB Publications,
$c
2024.
264
4
$c
©2025
300
$a
1 online resource (228 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
504
$a
Includes bibliographical references and index.
505
0 #
$a
Introduction to confidential computing : a comprehensive guide to understanding and exploring confidential computing -- About the Authors -- About the Reviewer -- Acknowledgements -- Preface -- Coloured Images -- Table of Contents -- 1. Vital Need for Confidential Computing -- 2. Trusted Execution Environments -- 3. Secure Application Development -- 4. Remote Attestation -- 5. Confidential Computing in Cloud -- 6. Confidential Artificial Intelligence -- 7. Prospects of Confidential Computing -- Appendix A: Enclave Initialization Instructions in Intel SGX -- Appendix B: Intel TDX Architectural Instructions -- Appendix C: Secure Boot Infrastructure Terminologies -- Index.
506
#
$a
Access restricted to authorized users and institutions.
520
3
$a
In an age where data breaches and privacy issues are growing, confidential computing offers a state-of-the-art solution. This technology helps organizations keep their most sensitive information safe, even against strong threats. Introduction to Confidential Computing provides a clear guide to this advanced cybersecurity technology. It explains why confidential computing is crucial for protecting sensitive data, covering key technologies, architectures, and frameworks. The book details remote attestation, which ensures computing environment integrity, and explores how confidential computing enhances AI training security. It also reviews solutions from major cloud providers, helping readers choose the right options. This book is perfect for anyone looking to boost their cybersecurity skills and stay ahead in data protection. By the end of this book, you will gain a thorough understanding of confidential computing and its impact on data security and privacy. You will be ready to assess and implement confidential computing solutions, safeguarding your organization's assets and meeting data privacy regulations. KEY FEATURES Comprehensive overview of confidential computing architectures and technologies. Guidance on leveraging confidential computing technologies for secure data processing and privacy protection. Learn how confidential computing ensures data privacy and protects AI model integrity through secure processing. WHAT YOU WILL LEARN Learn why confidential computing is crucial in today's digital world. Understand high-level architecture of various trusted execution environments implementations. Art of developing secure applications that can be deployed on TEE. Comprehend how remote attestation ensures the integrity of computing environments. Discover how RA-TLS could reshape the future of secure communications. Explore how confidential computing protects data and AI models. WHO THIS BOOK IS FOR This book is for software architects, security researchers, and developers to enhance application security using confidential computing. PhD candidates and postgraduates will explore TEEs, while AI/ML developers will understand how confidential AI protects data and models.
538
$a
Mode of access: World Wide Web.
650
# 7
$a
COMPUTERS / Security / General.
$2
bisacsh
$3
1483863
650
# 7
$a
COMPUTERS / Software Development & Engineering / General.
$2
bisacsh
$3
1413331
650
# 7
$a
COMPUTERS / Hardware / Chips & Processors.
$2
bisacsh
$3
1483955
655
# 4
$a
Electronic books.
$2
local
$3
554714
700
1 #
$a
Desai, Krishna,
$e
author
$3
1483954
856
4 0
$u
https://portal.igpublish.com/iglibrary/search/BPB0000686.html
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login