Showing 113 - 120 of 158
Developing a Secure COTS-based Trusted Computing System: An Introduction
Security and trusted computing, at the end of the day, really are all about the system. While the pieces and parts, such as the individual modules, operating system, and boot software, all are important, system security is not an additive process; it can’t simply be bolted-on to make the system secure.
07/25/2018