Contents at a Glance
Chapter 2: Basic Security Concepts
Chapter 3: Quick Tutorial on TPM 2.0
Chapter 4: Existing Applications That Use TPMs
Chapter 5: Navigating the Specification
Chapter 6: Execution Environment
Chapter 12: Platform Configuration Registers
Chapter 13: Authorizations and Sessions
Chapter 14: Extended Authorization (EA) Policies
Chapter 16: Auditing TPM Commands
Chapter 17: Decrypt/Encrypt Sessions
Chapter 18: Context Management
Chapter 19: Startup, Shutdown, and Provisioning
Chapter 21: Solving Bigger Problems with the TPM 2.0
3.129.25.231