For years, developers, IT and security professionals have tried to get their minds around the TPM. Most agree the secure, hardware root of trust is a good approach for ensuring data and devices are protected. And TPMs now of course are shipped in systems and boards worldwide – not only for PCs and mobile devices but for embedded systems of all kinds. But developing apps and using the TPM has not always been easy. Now, a new book from those most familiar with the technology hopes to give the development and security communities a simpler way to leverage the important technology.
“A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security” is described as a primer for developers of embedded systems, drivers and applications; security architects; engineering managers; and non-technical users of security applications on security and TPM concepts as well as how to develop useful apps.
Authors note that the book will get developers and others quickly up to speed on the concepts of the TPM and then lead them directly into useful applications. There are specific examples and readers should be able to create their own apps based on the information provided.
TCG will offer signed copies of the book free to the first 250 attendees of its RSA Conference 2015 session Monday, April 20, 9 a.m. – 1 p.m. Pacific, Moscone West Rooms 2002/2006.
For more information on the book or to download it or order print versions, go tohttp://www.apress.com/apressopen/9781430265832.
Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.
Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.
Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.