![Trusted Computing Platforms: TPM2.0 in Context: Proudler, Graeme, Chen, Liqun, Dalton, Chris: 9783319087436: Amazon.com: Books Trusted Computing Platforms: TPM2.0 in Context: Proudler, Graeme, Chen, Liqun, Dalton, Chris: 9783319087436: Amazon.com: Books](https://m.media-amazon.com/images/I/41Uy7lTGYrL._SR600%2C315_PIWhiteStrip%2CBottomLeft%2C0%2C35_PIStarRatingFOUR%2CBottomLeft%2C360%2C-6_SR600%2C315_SCLZZZZZZZ_FMpng_BG255%2C255%2C255.jpg)
Trusted Computing Platforms: TPM2.0 in Context: Proudler, Graeme, Chen, Liqun, Dalton, Chris: 9783319087436: Amazon.com: Books
![Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria: Hale, Michael W.: 9781568064864: Amazon.com: Books Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria: Hale, Michael W.: 9781568064864: Amazon.com: Books](https://m.media-amazon.com/images/I/31tL9ZqVi9L._AC_UF1000,1000_QL80_.jpg)
Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria: Hale, Michael W.: 9781568064864: Amazon.com: Books
![Amazon.com: Trusted Computer System Evaluation Criteria A Complete Guide: 9780655167853: Gerardus Blokdyk: Books Amazon.com: Trusted Computer System Evaluation Criteria A Complete Guide: 9780655167853: Gerardus Blokdyk: Books](https://m.media-amazon.com/images/I/61LVUCw4wzL._AC_UF1000,1000_QL80_.jpg)
Amazon.com: Trusted Computer System Evaluation Criteria A Complete Guide: 9780655167853: Gerardus Blokdyk: Books
![Amazon.com: Data Privacy and Trust in Cloud Computing: Building trust in the cloud through assurance and accountability (Palgrave Studies in Digital Business & Enabling Technologies): 9783030546595: Lynn, Theo, Mooney, John G., van Amazon.com: Data Privacy and Trust in Cloud Computing: Building trust in the cloud through assurance and accountability (Palgrave Studies in Digital Business & Enabling Technologies): 9783030546595: Lynn, Theo, Mooney, John G., van](https://m.media-amazon.com/images/I/71NblrYtw7L._AC_UF1000,1000_QL80_.jpg)
Amazon.com: Data Privacy and Trust in Cloud Computing: Building trust in the cloud through assurance and accountability (Palgrave Studies in Digital Business & Enabling Technologies): 9783030546595: Lynn, Theo, Mooney, John G., van
![Trusted Computing and Information Security: 11th Chinese Conference, CTCIS 2017, Changsha, China, September 14-17, 2017, Proceedings (Communications in Computer and Information Science, 704): Xu, Ming, Qin, Zheng, Yan, Fei, Fu, Shaojing: 9789811070792 ... Trusted Computing and Information Security: 11th Chinese Conference, CTCIS 2017, Changsha, China, September 14-17, 2017, Proceedings (Communications in Computer and Information Science, 704): Xu, Ming, Qin, Zheng, Yan, Fei, Fu, Shaojing: 9789811070792 ...](https://m.media-amazon.com/images/I/61Xei4e5KTL._AC_UF1000,1000_QL80_.jpg)
Trusted Computing and Information Security: 11th Chinese Conference, CTCIS 2017, Changsha, China, September 14-17, 2017, Proceedings (Communications in Computer and Information Science, 704): Xu, Ming, Qin, Zheng, Yan, Fei, Fu, Shaojing: 9789811070792 ...
![Autonomic and Trusted Computing: Rong, Chunming, Jaatun, Martin Gilje, Sandnes, Frode Eika: 9783540865223: Amazon.com: Books Autonomic and Trusted Computing: Rong, Chunming, Jaatun, Martin Gilje, Sandnes, Frode Eika: 9783540865223: Amazon.com: Books](https://m.media-amazon.com/images/I/41JfZxwSFhL._AC_UF1000,1000_QL80_.jpg)
Autonomic and Trusted Computing: Rong, Chunming, Jaatun, Martin Gilje, Sandnes, Frode Eika: 9783540865223: Amazon.com: Books
![Trusted Platform Module: Computing, Specification, Secure Cryptoprocessor, Cryptography, Dell, Trusted Computing Group : Surhone, Lambert M., Timpledon, Miriam T., Marseken, Susan F.: Amazon.it: Libri Trusted Platform Module: Computing, Specification, Secure Cryptoprocessor, Cryptography, Dell, Trusted Computing Group : Surhone, Lambert M., Timpledon, Miriam T., Marseken, Susan F.: Amazon.it: Libri](https://m.media-amazon.com/images/I/714tkkuiy7L._AC_UF1000,1000_QL80_.jpg)
Trusted Platform Module: Computing, Specification, Secure Cryptoprocessor, Cryptography, Dell, Trusted Computing Group : Surhone, Lambert M., Timpledon, Miriam T., Marseken, Susan F.: Amazon.it: Libri
![Trusted Computing for Embedded Systems: Candaele, Bernard, Soudris, Dimitrios, Anagnostopoulos, Iraklis: 9783319094199: Amazon.com: Books Trusted Computing for Embedded Systems: Candaele, Bernard, Soudris, Dimitrios, Anagnostopoulos, Iraklis: 9783319094199: Amazon.com: Books](https://m.media-amazon.com/images/I/61IAMxl3yFL._AC_UF1000,1000_QL80_.jpg)
Trusted Computing for Embedded Systems: Candaele, Bernard, Soudris, Dimitrios, Anagnostopoulos, Iraklis: 9783319094199: Amazon.com: Books
![Trusted network interpretation of the trusted computer system evaluation criteria: Unknown, .: Amazon.com: Books Trusted network interpretation of the trusted computer system evaluation criteria: Unknown, .: Amazon.com: Books](https://m.media-amazon.com/images/I/71JmMtOqWhL._AC_UF1000,1000_QL80_.jpg)
Trusted network interpretation of the trusted computer system evaluation criteria: Unknown, .: Amazon.com: Books
![Trusted Platform Modules: Why, when and how to use them (Computing and Networks): Segall, Ariel: 9781849198936: Amazon.com: Books Trusted Platform Modules: Why, when and how to use them (Computing and Networks): Segall, Ariel: 9781849198936: Amazon.com: Books](https://m.media-amazon.com/images/I/6160krLfvGL._AC_UF1000,1000_QL80_.jpg)
Trusted Platform Modules: Why, when and how to use them (Computing and Networks): Segall, Ariel: 9781849198936: Amazon.com: Books
![Big Data Recommender Systems: Algorithms, Architectures, Big Data, Security and Trust (Computing and Networks): Khalid, Osman, Khan, Samee U., Zomaya, Albert Y.: 9781785619755: Amazon.com: Books Big Data Recommender Systems: Algorithms, Architectures, Big Data, Security and Trust (Computing and Networks): Khalid, Osman, Khan, Samee U., Zomaya, Albert Y.: 9781785619755: Amazon.com: Books](https://m.media-amazon.com/images/I/610boTaenuL._AC_UF1000,1000_QL80_.jpg)
Big Data Recommender Systems: Algorithms, Architectures, Big Data, Security and Trust (Computing and Networks): Khalid, Osman, Khan, Samee U., Zomaya, Albert Y.: 9781785619755: Amazon.com: Books
![Amazon.com: Trusted Computing: Principles and Applications (Advances in Computer Science Book 2) eBook : Feng, Dengguo, Press, Tsinghua University: Kindle Store Amazon.com: Trusted Computing: Principles and Applications (Advances in Computer Science Book 2) eBook : Feng, Dengguo, Press, Tsinghua University: Kindle Store](https://m.media-amazon.com/images/I/41wtypvCpYL._SR600%2C315_PIWhiteStrip%2CBottomLeft%2C0%2C35_SCLZZZZZZZ_FMpng_BG255%2C255%2C255.jpg)
Amazon.com: Trusted Computing: Principles and Applications (Advances in Computer Science Book 2) eBook : Feng, Dengguo, Press, Tsinghua University: Kindle Store
![Trusted Computing Platforms: TCPA Technology in Context: 9780130092205: Computer Science Books @ Amazon.com Trusted Computing Platforms: TCPA Technology in Context: 9780130092205: Computer Science Books @ Amazon.com](https://m.media-amazon.com/images/I/41gNBf-qBPL._SR600%2C315_PIWhiteStrip%2CBottomLeft%2C0%2C35_SCLZZZZZZZ_FMpng_BG255%2C255%2C255.jpg)
Trusted Computing Platforms: TCPA Technology in Context: 9780130092205: Computer Science Books @ Amazon.com
![Amazon.com: Trusted Computing: Principles and Applications (Advances in Computer Science Book 2) eBook : Feng, Dengguo, Press, Tsinghua University: Kindle Store Amazon.com: Trusted Computing: Principles and Applications (Advances in Computer Science Book 2) eBook : Feng, Dengguo, Press, Tsinghua University: Kindle Store](https://m.media-amazon.com/images/I/41wtypvCpYL.jpg)
Amazon.com: Trusted Computing: Principles and Applications (Advances in Computer Science Book 2) eBook : Feng, Dengguo, Press, Tsinghua University: Kindle Store
![A TRUSTED SECURITY AND AUTHENTICATION MODEL FOR CLOUD COMPUTING: SECURITY AND AUTHENTICATION MODELS: Chennam, Krishna Keerthi, Mudanna, Akka Lakshmi, Aluvalu, Rajanikanth: 9786202520317: Amazon.com: Books A TRUSTED SECURITY AND AUTHENTICATION MODEL FOR CLOUD COMPUTING: SECURITY AND AUTHENTICATION MODELS: Chennam, Krishna Keerthi, Mudanna, Akka Lakshmi, Aluvalu, Rajanikanth: 9786202520317: Amazon.com: Books](https://m.media-amazon.com/images/I/51JijEWgRSL._AC_UF1000,1000_QL80_.jpg)
A TRUSTED SECURITY AND AUTHENTICATION MODEL FOR CLOUD COMPUTING: SECURITY AND AUTHENTICATION MODELS: Chennam, Krishna Keerthi, Mudanna, Akka Lakshmi, Aluvalu, Rajanikanth: 9786202520317: Amazon.com: Books
![Trusted Computing Platforms: TCPA Technology in Context: 9780130092205: Computer Science Books @ Amazon.com Trusted Computing Platforms: TCPA Technology in Context: 9780130092205: Computer Science Books @ Amazon.com](https://m.media-amazon.com/images/I/41gNBf-qBPL._AC_UF1000,1000_QL80_.jpg)
Trusted Computing Platforms: TCPA Technology in Context: 9780130092205: Computer Science Books @ Amazon.com
![A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security: Arthur, Will, Challener, David: 9781430265832: Amazon.com: Books A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security: Arthur, Will, Challener, David: 9781430265832: Amazon.com: Books](https://m.media-amazon.com/images/I/61ix9JfbaNL._AC_UF1000,1000_QL80_.jpg)
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security: Arthur, Will, Challener, David: 9781430265832: Amazon.com: Books
![Security, Trust, and Regulatory Aspects of Cloud Computing in Business Environments: 9781466657885: S. Srinivasan: Books - Amazon.com Security, Trust, and Regulatory Aspects of Cloud Computing in Business Environments: 9781466657885: S. Srinivasan: Books - Amazon.com](https://m.media-amazon.com/images/I/713uvy98pML._AC_UF1000,1000_QL80_.jpg)