Introduction to Confidential Computing Praveenraj, R, Krishna Desai
- Autorzy:
- Praveenraj, R, Krishna Desai
- Wydawnictwo:
- BPB Publications
- Ocena:
- Stron:
- 226
- Dostępne formaty:
-
ePubMobi
Zostało Ci
na świąteczne zamówienie
opcje wysyłki »
Opis
książki
:
Introduction to Confidential Computing
Description
In an age where data breaches and privacy issues are growing, confidential computing offers a state-of-the-art solution. This technology helps organizations keep their most sensitive information safe, even against strong threats.
Introduction to Confidential Computing provides a clear guide to this advanced cybersecurity technology. It explains why confidential computing is crucial for protecting sensitive data, covering key technologies, architectures, and frameworks. The book details remote attestation, which ensures computing environment integrity, and explores how confidential computing enhances AI training security. It also reviews solutions from major cloud providers, helping readers choose the right options. This book is perfect for anyone looking to boost their cybersecurity skills and stay ahead in data protection.
By the end of this book, you will gain a thorough understanding of confidential computing and its impact on data security and privacy. You will be ready to assess and implement confidential computing solutions, safeguarding your organization's assets and meeting data privacy regulations. Key Features
Comprehensive overview of confidential computing architectures and technologies.
Guidance on leveraging confidential computing technologies for secure data processing and privacy protection.
Learn how confidential computing ensures data privacy and protects AI model integrity through secure processing. What you will learn
Learn why confidential computing is crucial in today's digital world.
Understand high-level architecture of various trusted execution environments implementations.
Art of developing secure applications that can be deployed on TEE.
Comprehend how remote attestation ensures the integrity of computing environments.
Discover how RA-TLS could reshape the future of secure communications.
Explore how confidential computing protects data and AI models. Who this book is for
This book is for software architects, security researchers, and developers to enhance application security using confidential computing. PhD candidates and postgraduates will explore TEEs, while AI/ML developers will understand how confidential AI protects data and models. Table of Contents
1. Vital Need for Confidential Computing
2. Trusted Execution Environments
3. Secure Application Development
4. Remote Attestation
5. Confidential Computing in Cloud
6. Confidential Artificial Intelligence
7. Prospects of Confidential Computing
Appendix A: Enclave Initialization Instructions in Intel SGX
Appendix B: Intel TDX Architectural Instructions
Appendix C: Secure Boot Infrastructure Terminologies
In an age where data breaches and privacy issues are growing, confidential computing offers a state-of-the-art solution. This technology helps organizations keep their most sensitive information safe, even against strong threats.
Introduction to Confidential Computing provides a clear guide to this advanced cybersecurity technology. It explains why confidential computing is crucial for protecting sensitive data, covering key technologies, architectures, and frameworks. The book details remote attestation, which ensures computing environment integrity, and explores how confidential computing enhances AI training security. It also reviews solutions from major cloud providers, helping readers choose the right options. This book is perfect for anyone looking to boost their cybersecurity skills and stay ahead in data protection.
By the end of this book, you will gain a thorough understanding of confidential computing and its impact on data security and privacy. You will be ready to assess and implement confidential computing solutions, safeguarding your organization's assets and meeting data privacy regulations. Key Features
Comprehensive overview of confidential computing architectures and technologies.
Guidance on leveraging confidential computing technologies for secure data processing and privacy protection.
Learn how confidential computing ensures data privacy and protects AI model integrity through secure processing. What you will learn
Learn why confidential computing is crucial in today's digital world.
Understand high-level architecture of various trusted execution environments implementations.
Art of developing secure applications that can be deployed on TEE.
Comprehend how remote attestation ensures the integrity of computing environments.
Discover how RA-TLS could reshape the future of secure communications.
Explore how confidential computing protects data and AI models. Who this book is for
This book is for software architects, security researchers, and developers to enhance application security using confidential computing. PhD candidates and postgraduates will explore TEEs, while AI/ML developers will understand how confidential AI protects data and models. Table of Contents
1. Vital Need for Confidential Computing
2. Trusted Execution Environments
3. Secure Application Development
4. Remote Attestation
5. Confidential Computing in Cloud
6. Confidential Artificial Intelligence
7. Prospects of Confidential Computing
Appendix A: Enclave Initialization Instructions in Intel SGX
Appendix B: Intel TDX Architectural Instructions
Appendix C: Secure Boot Infrastructure Terminologies
Dzięki opcji "Druk na żądanie" do sprzedaży wracają tytuły Grupy Helion, które cieszyły sie dużym zainteresowaniem, a których nakład został wyprzedany.
Dla naszych Czytelników wydrukowaliśmy dodatkową pulę egzemplarzy w technice druku cyfrowego.
Co powinieneś wiedzieć o usłudze "Druk na żądanie":
- usługa obejmuje tylko widoczną poniżej listę tytułów, którą na bieżąco aktualizujemy;
- cena książki może być wyższa od początkowej ceny detalicznej, co jest spowodowane kosztami druku cyfrowego (wyższymi niż koszty tradycyjnego druku offsetowego). Obowiązująca cena jest zawsze podawana na stronie WWW książki;
- zawartość książki wraz z dodatkami (płyta CD, DVD) odpowiada jej pierwotnemu wydaniu i jest w pełni komplementarna;
- usługa nie obejmuje książek w kolorze.
Masz pytanie o konkretny tytuł? Napisz do nas: sklep@ebookpoint.pl
Proszę wybrać ocenę!
Proszę wpisać opinię!
Książka drukowana
Oceny i opinie klientów: Introduction to Confidential Computing Praveenraj, R, Krishna Desai (0) Weryfikacja opinii następuje na podstawie historii zamowień na koncie Użytkownika umiejszczającego opinię.