語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Introduction to confidential computing : = a comprehensive guide to understanding and exploring confidential computing /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Introduction to confidential computing :/ R Praveenraj, Krishna Desai.
其他題名:
a comprehensive guide to understanding and exploring confidential computing /
作者:
Praveenraj, R.
其他作者:
Desai, Krishna,
面頁冊數:
1 online resource (228 pages)
標題:
COMPUTERS / Security / General. -
電子資源:
https://portal.igpublish.com/iglibrary/search/BPB0000686.html
ISBN:
9789365891522
Introduction to confidential computing : = a comprehensive guide to understanding and exploring confidential computing /
Praveenraj, R.
Introduction to confidential computing :
a comprehensive guide to understanding and exploring confidential computing /R Praveenraj, Krishna Desai. - 1 online resource (228 pages)
Includes bibliographical references and index.
Introduction to confidential computing : a comprehensive guide to understanding and exploring confidential computing -- About the Authors -- About the Reviewer -- Acknowledgements -- Preface -- Coloured Images -- Table of Contents -- 1. Vital Need for Confidential Computing -- 2. Trusted Execution Environments -- 3. Secure Application Development -- 4. Remote Attestation -- 5. Confidential Computing in Cloud -- 6. Confidential Artificial Intelligence -- 7. Prospects of Confidential Computing -- Appendix A: Enclave Initialization Instructions in Intel SGX -- Appendix B: Intel TDX Architectural Instructions -- Appendix C: Secure Boot Infrastructure Terminologies -- Index.
Access restricted to authorized users and institutions.
In an age where data breaches and privacy issues are growing, confidential computing offers a state-of-the-art solution. This technology helps organizations keep their most sensitive information safe, even against strong threats. Introduction to Confidential Computing provides a clear guide to this advanced cybersecurity technology. It explains why confidential computing is crucial for protecting sensitive data, covering key technologies, architectures, and frameworks. The book details remote attestation, which ensures computing environment integrity, and explores how confidential computing enhances AI training security. It also reviews solutions from major cloud providers, helping readers choose the right options. This book is perfect for anyone looking to boost their cybersecurity skills and stay ahead in data protection. By the end of this book, you will gain a thorough understanding of confidential computing and its impact on data security and privacy. You will be ready to assess and implement confidential computing solutions, safeguarding your organization's assets and meeting data privacy regulations. KEY FEATURES Comprehensive overview of confidential computing architectures and technologies. Guidance on leveraging confidential computing technologies for secure data processing and privacy protection. Learn how confidential computing ensures data privacy and protects AI model integrity through secure processing. WHAT YOU WILL LEARN Learn why confidential computing is crucial in today's digital world. Understand high-level architecture of various trusted execution environments implementations. Art of developing secure applications that can be deployed on TEE. Comprehend how remote attestation ensures the integrity of computing environments. Discover how RA-TLS could reshape the future of secure communications. Explore how confidential computing protects data and AI models. WHO THIS BOOK IS FOR This book is for software architects, security researchers, and developers to enhance application security using confidential computing. PhD candidates and postgraduates will explore TEEs, while AI/ML developers will understand how confidential AI protects data and models.
Mode of access: World Wide Web.
ISBN: 9789365891522Subjects--Topical Terms:
1483863
COMPUTERS / Security / General.
Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Introduction to confidential computing : = a comprehensive guide to understanding and exploring confidential computing /
LDR
:03958nam a2200289 i 4500
001
1157341
006
m eo d
007
cr cn |||m|||a
008
250717s2024 ob 000 0 eng d
020
$a
9789365891522
020
$a
9789365892147
035
$a
BPB0000686
041
0
$a
eng
050
0 0
$a
QA76.9.A25
082
0 0
$a
005.8
100
1
$a
Praveenraj, R.
$3
1483953
245
1 0
$a
Introduction to confidential computing :
$b
a comprehensive guide to understanding and exploring confidential computing /
$c
R Praveenraj, Krishna Desai.
264
1
$a
[Place of publication not identified] :
$b
BPB Publications,
$c
2024.
264
4
$c
©2025
300
$a
1 online resource (228 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
504
$a
Includes bibliographical references and index.
505
0
$a
Introduction to confidential computing : a comprehensive guide to understanding and exploring confidential computing -- About the Authors -- About the Reviewer -- Acknowledgements -- Preface -- Coloured Images -- Table of Contents -- 1. Vital Need for Confidential Computing -- 2. Trusted Execution Environments -- 3. Secure Application Development -- 4. Remote Attestation -- 5. Confidential Computing in Cloud -- 6. Confidential Artificial Intelligence -- 7. Prospects of Confidential Computing -- Appendix A: Enclave Initialization Instructions in Intel SGX -- Appendix B: Intel TDX Architectural Instructions -- Appendix C: Secure Boot Infrastructure Terminologies -- Index.
506
$a
Access restricted to authorized users and institutions.
520
3
$a
In an age where data breaches and privacy issues are growing, confidential computing offers a state-of-the-art solution. This technology helps organizations keep their most sensitive information safe, even against strong threats. Introduction to Confidential Computing provides a clear guide to this advanced cybersecurity technology. It explains why confidential computing is crucial for protecting sensitive data, covering key technologies, architectures, and frameworks. The book details remote attestation, which ensures computing environment integrity, and explores how confidential computing enhances AI training security. It also reviews solutions from major cloud providers, helping readers choose the right options. This book is perfect for anyone looking to boost their cybersecurity skills and stay ahead in data protection. By the end of this book, you will gain a thorough understanding of confidential computing and its impact on data security and privacy. You will be ready to assess and implement confidential computing solutions, safeguarding your organization's assets and meeting data privacy regulations. KEY FEATURES Comprehensive overview of confidential computing architectures and technologies. Guidance on leveraging confidential computing technologies for secure data processing and privacy protection. Learn how confidential computing ensures data privacy and protects AI model integrity through secure processing. WHAT YOU WILL LEARN Learn why confidential computing is crucial in today's digital world. Understand high-level architecture of various trusted execution environments implementations. Art of developing secure applications that can be deployed on TEE. Comprehend how remote attestation ensures the integrity of computing environments. Discover how RA-TLS could reshape the future of secure communications. Explore how confidential computing protects data and AI models. WHO THIS BOOK IS FOR This book is for software architects, security researchers, and developers to enhance application security using confidential computing. PhD candidates and postgraduates will explore TEEs, while AI/ML developers will understand how confidential AI protects data and models.
538
$a
Mode of access: World Wide Web.
650
7
$a
COMPUTERS / Security / General.
$2
bisacsh
$3
1483863
650
7
$a
COMPUTERS / Software Development & Engineering / General.
$2
bisacsh
$3
1413331
650
7
$a
COMPUTERS / Hardware / Chips & Processors.
$2
bisacsh
$3
1483955
655
4
$a
Electronic books.
$2
local
$3
554714
700
1
$a
Desai, Krishna,
$e
author
$3
1483954
856
4 0
$u
https://portal.igpublish.com/iglibrary/search/BPB0000686.html
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入