Sponsored Content
Full Discussion: Trusted Computing
Special Forums Cybersecurity Trusted Computing Post 302076797 by kduffin on Thursday 15th of June 2006 03:07:29 PM
Old 06-15-2006
Trusted Computing

About a year ago, a friend of mine who worked on the OReilly Snort book took a propsal he and I had worked on for a book on Trusted Computing. Though the editor thought the content was good and worthwhile, he felt that there wasn't enough of a market to justify printing such a work.

How many people here have systems that use one form or another of the Trusted Computing Base?

Cheers,

Keith
 

8 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

NIS+ and trusted hosts

Hello there, Can someone tell me if you need to make the hosts trusted hosts if you use NIS+? Thanks, E (2 Replies)
Discussion started by: eknaap
2 Replies

2. HP-UX

Trusted system: Please Help.

I was playing with sam and i turned on the Trusted System feature (UX11i). Now i cant log onto it anymore, i can ping it, but icant telnet, rlogin or login at the login screen. I dont want to reboot my machine because i am affraid it wont boot and ask for a password. My root password is not... (1 Reply)
Discussion started by: Netghost
1 Replies

3. Virtualization and Cloud Computing

Event Cloud Computing - IBM Turning Data Centers Into ?Computing Cloud?

Tim Bass Thu, 15 Nov 2007 23:55:07 +0000 *I predict we may experience less*debates*on the use of the term “event cloud”*related to*CEP in the future, now that both IBM and Google* have made announcements about “cloud computing” and “computing cloud”, IBM Turning Data Centers Into ‘Computing... (0 Replies)
Discussion started by: Linux Bot
0 Replies

4. AIX

Switch off TCB (Trusted Computing Base)

I wanted to do an "Alternate Disk Migration" via my NIM server to update several clients (all LPARs in a p670) from 5.1 ML6 to 5.2 ML3. As a prerequisite the procedure says "if the system has the Trusted Computing Base enabled it has to be switched off before". Well, i didn't give this too much... (3 Replies)
Discussion started by: bakunin
3 Replies

5. Solaris

Solaris Trusted Extension ?

How to check if a system has Solaris trusted extensions installed or not on a solaris 10 system ? (5 Replies)
Discussion started by: fugitive
5 Replies

6. Linux

Linux kernel & Trusted Computing

Anyone have a current/cumulative list of all Trusted Computing-based drivers, modules, etc., that have been added to the kernel? (0 Replies)
Discussion started by: Varsel
0 Replies

7. UNIX for Advanced & Expert Users

Converting system to trusted

Hi, I need to convert few HP-UX (V 11.31) machines from un-trusted to trusted. I used the HP SMH to do this on one server. However when I click on "Yes" to proceed with the conversion, I get this error : The attempt to convert this system to a trusted system failed. The command return value... (2 Replies)
Discussion started by: anaigini45
2 Replies

8. UNIX for Beginners Questions & Answers

Adding an application in trusted computing base

How to add new application/ code into trusted computing base in linux? or How to bind new command for IMA-measurement at boot time in Ubuntu? (0 Replies)
Discussion started by: iambharatmanral
0 Replies
DERIVATIONS(7)						Derivations of Applied Mathematics					    DERIVATIONS(7)

NAME
derivations - book: Derivations of Applied Mathematics DESCRIPTION
Understandably, program sources rarely derive the mathematical formulas they use. Not wishing to take the formulas on faith, a user might nevertheless reasonably wish to see such formulas somewhere derived. Derivations of Applied Mathematics is a book which documents and derives many of the mathematical formulas and methods implemented in free software or used in science and engineering generally. It documents and derives the Taylor series (used to calculate trigonometrics), the Newton-Raphson method (used to calculate square roots), the Pythagorean theorem (used to calculate distances) and many others. READING THE BOOK
Among other ways, you can read the book on your computer screen by opening the file /usr/share/doc/derivations/derivations.ps.gz with the gv(1) program under X(7). To print the book on a standard postscript printer, just zcat(1) then lpr(1) the same file. FILES
/usr/share/doc/derivations/derivations.ps.gz the book in postscript format /usr/share/doc/derivations/derivations.pdf.gz the book in PDF BUGS
The book is a work in progress. AUTHOR
The book and this manpage are written by Thaddeus H. Black, who also maintains the Debian package derivations in which they are distrib- uted. Users who need to contact the author in his role as Debian package maintainer can reach him at <thb@debian.org>. However, most e- mail will naturally be about the book itself: this should be sent to <thb@derivations.org>. COPYLEFT
Copyright (C) 1983-2010 Thaddeus H. Black. The book, this manpage and the entire derivations distribution are free software. You can redistribute them and/or modify them under the terms of the GNU General Public License, version 2. SEE ALSO
gv(1) [gv], zcat(1) [gzip], psselect(1) [psutils], lpr(1) [lpr], octave(1) [octave] Thaddeus H. Black 10 March 2010 DERIVATIONS(7)
All times are GMT -4. The time now is 06:07 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy