Content management and protection using Trusted Computing and MPEG-21: Concepts for metadata, protection and implementation (German Edition): Schreiner, Florian: 9783838127859: Amazon.com: Books
Secure and Trusted Checkpointing Recovery in Mobile Computing: On Design of Mobility based Checkpointing Algorithms considering Security and Trust in Mobile Cellular and Adhoc Network: Biswas, Suparna, Neogy, Sarmistha: 9783330036222: Amazon.com: Books
Security, Trust, and Regulatory Aspects of Cloud Computing in Business Environments: 9781466657885: S. Srinivasan: Books - Amazon.com
Trusted Computing Platforms: Design and Applications, Smith, Sean W., eBook - Amazon.com
Amazon.com: Data Privacy and Trust in Cloud Computing: Building trust in the cloud through assurance and accountability (Palgrave Studies in Digital Business & Enabling Technologies): 9783030546595: Lynn, Theo, Mooney, John G., van
Autonomic and Trusted Computing: Rong, Chunming, Jaatun, Martin Gilje, Sandnes, Frode Eika: 9783540865223: Amazon.com: Books
Amazon.com: Bootstrapping Trust in Modern Computers (SpringerBriefs in Computer Science): 9781461414599: Parno, Bryan, McCune, Jonathan M., Perrig, Adrian: Books
Trusted Computing | AWS Compute Blog
Amazon.com: Trust and Trustworthy Computing: Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010, Proceedings (Lecture Notes in Computer Science, 6101): 9783642138683: Acquisti, Alessandro, Smith, Sean W., Sadeghi, Ahmad-Reza ...
Amazon.com: Trusted Computer System Evaluation Criteria A Complete Guide: 9780655167853: Gerardus Blokdyk: Books
A Practical Guide to Trusted Computing: 9780132398428: Computer Science Books @ Amazon.com
Amazon.com: Trust in Computer Systems and the Cloud: 9781119692324: Bursell, Mike: Books
Trust, Computing, and Society: 9781107038479: Computer Science Books @ Amazon.com
Amazon.com: Trusted Computing: Principles and Applications (Advances in Computer Science Book 2) eBook : Feng, Dengguo, Press, Tsinghua University: Kindle Store
Trusted Platform Module: Computing, Specification, Secure Cryptoprocessor, Cryptography, Dell, Trusted Computing Group : Surhone, Lambert M., Timpledon, Miriam T., Marseken, Susan F.: Amazon.it: Libri
Big Data Recommender Systems: Algorithms, Architectures, Big Data, Security and Trust (Computing and Networks): Khalid, Osman, Khan, Samee U., Zomaya, Albert Y.: 9781785619755: Amazon.com: Books
Trusted Computing and Information Security: 11th Chinese Conference, CTCIS 2017, Changsha, China, September 14-17, 2017, Proceedings (Communications in Computer and Information Science, 704): Xu, Ming, Qin, Zheng, Yan, Fei, Fu, Shaojing: 9789811070792 ...
Trusted Platform Modules: Why, when and how to use them (Computing and Networks): Segall, Ariel: 9781849198936: Amazon.com: Books
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security: Arthur, Will, Challener, David: 9781430265832: Amazon.com: Books