Introduction
One of the major problems with trusted computing adoption has been a lack of good introductory information. People wondering what this technology is, why they should care about it, or how they should get started using it have generally not had very many resources to turn to. In this book, I will begin with the most basic questions of what the technology is; talk about when this technology is most useful (and, equally important, when it's not); and then start introducing the technical details of why and how to use the technology. If you're still at the stage of wondering if this technology is relevant to you, start with the first couple of chapters; there's enough complexity here that a classic engineer's `jump in feet first' approach is inefficient. If you're familiar with the basics of trusted computing technology already, Chapters 4 and up will provide you with useful reference material, but you may also find new ideas for how trusted computing can be applied in your environment in Chapter 2. This book is intended for a technical audience, but not one with any particular familiarity with trusted computing, hardware, or security concepts.
Introduction, Page 1 of 2
< Previous page Next page > /docserver/preview/fulltext/books/pc/pbpc013e/PBPC013E_ch1-1.gif /docserver/preview/fulltext/books/pc/pbpc013e/PBPC013E_ch1-2.gif