Издательство: | Книга по требованию |
Дата выхода: | июль 2011 |
ISBN: | 978-6-1345-2932-7 |
Объём: | 96 страниц |
Масса: | 166 г |
Размеры(В x Ш x Т), см: | 23 x 16 x 1 |
Please note that the content of this book primarily consists of articles available from Wikipedia or other free sources online. In computer security, a chain of trust is established by validating each component of hardware and software from the bottom up. It is intended to ensure that only trusted software and hardware can be used while still remaining flexible.A chain of trust is designed to allow multiple users to create and use software on the system, which would be more difficult if all the keys were stored directly in hardware. It starts with hardware that will only boot from software that is digitally signed. The signing authority will only sign boot programs that enforce security, such as only running programs that are themselves signed, or only allowing signed code to have access to certain features of the machine. This process may continue for several layers.
Данное издание не является оригинальным. Книга печатается по технологии принт-он-деманд после получения заказа.