Download or read book DB2 SQL PL written by Zamil Janmohamed and published by Prentice-Hall PTR. This book was released on 2005 with total page 586 pages. Available in PDF, EPUB and Kindle. Book excerpt: Straight from IBM - the ultimate DB2 PL SQL resource and the FIRST and ONLY to cover DB2 UDB 8.2!
Download or read book DB2 SQL Procedural Language for Linux UNIX and Windows written by Paul Yip and published by Prentice Hall Professional. This book was released on 2003 with total page 352 pages. Available in PDF, EPUB and Kindle. Book excerpt: This certification guide offers a complete, start-to-finish coverage of DB2 Universal Database Version 8 administration. With Version 8 key topics such as Performance Enhancements, Manageability Enhancements, etc. are addressed.
Download or read book Understanding DB2 written by Raul F. Chong and published by Pearson Education. This book was released on 2007-12-29 with total page 1138 pages. Available in PDF, EPUB and Kindle. Book excerpt: The Easy, Visual Way to Master IBM® DB2 for Linux®, UNIX®, and Windows®—Fully Updated for Version 9.5 IBM DB2 9 and DB2 9.5 provide breakthrough capabilities for providing Information on Demand, implementing Web services and Service Oriented Architecture, and streamlining information management. Understanding DB2: Learning Visually with Examples, Second Edition, is the easiest way to master the latest versions of DB2 and apply their full power to your business challenges. Written by four IBM DB2 experts, this book introduces key concepts with dozens of examples drawn from the authors' experience working with DB2 in enterprise environments. Thoroughly updated for DB2 9.5, it covers new innovations ranging from manageability to performance and XML support to API integration. Each concept is presented with easy-to-understand screenshots, diagrams, charts, and tables. This book is for everyone who works with DB2: database administrators, system administrators, developers, and consultants. With hundreds of well-designed review questions and answers, it will also help professionals prepare for the IBM DB2 Certification Exams 730, 731, or 736. Coverage includes Choosing the right version of DB2 for your needs Installing and configuring DB2 Understanding the DB2 environment, instances, and databases Establishing client and server connectivity Working with database objects Utilizing breakthrough pureXMLTM technology, which provides for nativeXML support Mastering administration, maintenance, performance optimization, troubleshooting, and recovery Understanding improvements in the DB2 process, memory, and storage models Implementing effective database security Leveraging the power of SQL and XQuery
Download or read book Oracle SQL and PL SQL for Developers written by Joel Murach and published by Mike Murach & Associates. This book was released on 2014 with total page 0 pages. Available in PDF, EPUB and Kindle. Book excerpt: If you're developing applications that access Oracle databases, you can save time and trouble by having the database do more work for you. That's where this book comes in. It teaches you how to create effective SQL queries to retrieve and update the data in an Oracle database. It teaches you how to design and implement a database, giving you insight into performance and security issues. It teaches you how to use Oracle's procedural language, PL/SQL, to take advantage of powerful features like stored procedures, functions, and triggers. In short, it teaches you to write the kind of SQL and PL/SQL that makes you a more effective and valuable developer.
Download or read book DB2 pureXML Cookbook written by Matthias Nicola and published by Pearson Education. This book was released on 2009-08-10 with total page 938 pages. Available in PDF, EPUB and Kindle. Book excerpt: DB2 pureXML Cookbook Master the Power of the IBM Hybrid Data Server Hands-On Solutions and Best Practices for Developing and Managing XML Database Applications with DB2 More and more database developers and DBAs are being asked to develop applications and manage databases that involve XML data. Many are utilizing the highly praised DB2 pureXML technology from IBM. In the DB2 pureXML Cookbook, two leading experts from IBM offer the practical solutions and proven code samples that database professionals need to build better XML solutions faster. Organized by task, this book is packed with more than 700 easy-to-adapt “recipe-style” examples covering the entire application lifecycle–from planning and design through coding, optimization, and troubleshooting. This extraordinary library of recipes includes more than 250 XQuery and SQL/XML queries. With the authors’ hands-on guidance, you’ll learn how to combine pureXML “ingredients” to efficiently perform virtually any XML data management task, from the simplest to the most advanced. Coverage includes pureXML in DB2 9 for z/OS and DB2 9.1, 9.5, and 9.7 for Linux, UNIX, and Windows Best practices for designing XML data, applications, and storage objects Importing, exporting, loading, replicating, and federating XML data Querying XML data, from start to finish: XPath and XQuery data model and languages, SQL/XML, stored procedures, UDFs, and much more Avoiding common errors and inefficient XML queries Converting relational data to XML and vice versa Updating and transforming XML documents Defining and working with XML indexes Monitoring and optimizing the performance of XML queries and other operations Using XML Schemas to constrain and validate XML documents XML application development–including code samples for Java, .NET, C, COBOL,PL/1, PHP, and Perl
Download or read book DB2 9 for Linux UNIX and Windows written by George Baklarz and published by Pearson Education. This book was released on 2007-11-19 with total page 1284 pages. Available in PDF, EPUB and Kindle. Book excerpt: DB2® 9 builds on the world's number one enterprise database to simplify the delivery of information as a service, accelerate development, and dramatically improve operational efficiency, security, and resiliency. Now, this new edition offers complete, start-to-finish coverage of DB2 9 administration and development for Linux®, UNIX®, and Windows® platforms, as well as authoritative preparation for the latest IBM DB2 certification exam. Written for both DBAs and developers, this definitive reference and self-study guide covers all aspects of deploying and managing DB2 9, including DB2 database design and development; day-to-day administration and backup; deployment of networked, Internet-centered, and SOA-based applications; migration; and much more. You'll also find an unparalleled collection of expert tips for optimizing performance, availability, and value. Coverage includes: Important security and resiliency enhancements, including advanced access control; fine-grained, label-based security; and the new security administrator role Breakthrough pureXMLTM features that make it easier to succeed with service-oriented architecture Operational improvements that enhance DBA efficiency--including self-tuning memory allocation, automated storage management, and storage optimization Table-partitioning features that improve scalability and manageability Powerful improvements for more agile and rapid development, including the new Eclipse-based Developer Workbench and simple SQL or XQuery access to all data Whatever your role in working with DB2 or preparing for certification, DB2 9 for Linux, UNIX, and Windows, Sixth Edition is the one book you can't afford to be without. Download Complete DB2 V9 Trial Version Visit ibm.com/db2/9/download.html to download a complete trial version of DB2, which enables you to try out dozens of the most powerful features of DB2 for yourself: everything from pureXML support to automated administration and optimization. Straight from IBM, the ultimate guide to running DB2 9 and preparing for the latest IBM DB2 certification exam! Covers powerful DB2 9 enhancements ranging from automated management to improved compression Covers the full spectrum of DBA responsibilities, including server management, data placement, XML concepts, activity analysis, high availability, and security Presents expert tips and best practices from the DB2 customer support organization
Download or read book Mainframe Basics for Security Professionals written by Ori Pomerantz and published by Pearson Education. This book was released on 2007-12-28 with total page 194 pages. Available in PDF, EPUB and Kindle. Book excerpt: Leverage Your Security Expertise in IBM® System zTM Mainframe Environments For over 40 years, the IBM mainframe has been the backbone of the world’s largest enterprises. If you’re coming to the IBM System z mainframe platform from UNIX®, Linux®, or Windows®, you need practical guidance on leveraging its unique security capabilities. Now, IBM experts have written the first authoritative book on mainframe security specifically designed to build on your experience in other environments. Even if you’ve never logged onto a mainframe before, this book will teach you how to run today’s z/OS® operating system command line and ISPF toolset and use them to efficiently perform every significant security administration task. Don’t have a mainframe available for practice? The book contains step-by-step videos walking you through dozens of key techniques. Simply log in and register your book at www.ibmpressbooks.com/register to gain access to these videos. The authors illuminate the mainframe’s security model and call special attention to z/OS security techniques that differ from UNIX, Linux, and Windows. They thoroughly introduce IBM’s powerful Resource Access Control Facility (RACF) security subsystem and demonstrate how mainframe security integrates into your enterprise-wide IT security infrastructure. If you’re an experienced system administrator or security professional, there’s no faster way to extend your expertise into “big iron” environments. Coverage includes Mainframe basics: logging on, allocating and editing data sets, running JCL jobs, using UNIX System Services, and accessing documentation Creating, modifying, and deleting users and groups Protecting data sets, UNIX file system files, databases, transactions, and other resources Manipulating profiles and managing permissions Configuring the mainframe to log security events, filter them appropriately, and create usable reports Using auditing tools to capture static configuration data and dynamic events, identify weaknesses, and remedy them Creating limited-authority administrators: how, when, and why
Download or read book SQL Procedures Triggers and Functions on IBM DB2 for i written by Hernando Bedoya and published by IBM Redbooks. This book was released on 2016-04-25 with total page 338 pages. Available in PDF, EPUB and Kindle. Book excerpt: Structured Query Language (SQL) procedures, triggers, and functions, which are also known as user-defined functions (UDFs), are the key database features for developing robust and distributed applications. IBM® DB2® for i supported these features for many years, and they are enhanced in IBM i versions 6.1, 7.1, and 7.2. DB2 for i refers to the IBM DB2 family member and relational database management system that is integrated within the IBM Power operating system that is known as IBM i. This IBM Redbooks® publication includes several of the announced features for SQL procedures, triggers, and functions in IBM i versions 6.1, 7.1, and 7.2. This book includes suggestions, guidelines, and practical examples to develop DB2 for i SQL procedures, triggers, and functions effectively. This book covers the following topics: Introduction to the SQL/Persistent Stored Modules (PSM) language, which is used in SQL procedures, triggers, and functions SQL procedures SQL triggers SQL functions This book is for IBM i database engineers and data-centric developers who strive to provide flexible, extensible, agile, and scalable database solutions that meet business requirements in a timely manner. Before you read this book, you need to know about relational database technology and the application development environment on the IBM Power SystemsTM with the IBM i operating system.
Download or read book Project Management with the IBM Rational Unified Process written by R. Dennis Gibbs and published by Prentice Hall Professional. This book was released on 2006-07-27 with total page 311 pages. Available in PDF, EPUB and Kindle. Book excerpt: · Master win–win techniques for managing outsourced and offshore projects, from procurement and risk mitigation to maintenance · Use RUP to implement best-practice project management throughout the software development lifecycle · Overcome key management challenges, from changing requirements to managing user expectations The Hands-On, Start-to-Finish Guide to Managing Software Projects with the IBM® Rational Unified Process® This is the definitive guide to managing software development projects with the IBM Rational Unified Process (RUP®). Drawing on his extensive experience managing projects with the RUP, R. Dennis Gibbs covers the entire development lifecycle, from planning and requirements to post-mortems and system maintenance. Gibbs offers especially valuable insights into using the RUP to manage outsourced projects and any project relying on distributed development teams—outsourced, insourced, or both. This “from the trenches” guidebook is invaluable for anyone interested in best practices for managing software development: project managers, team leaders, procurement and contracting specialists, quality assurance and software process professionals, consultants, and developers. If you’re already using the RUP, Gibbs will help you more effectively use it. Whatever your role or the RUP experience, you’ll learn ways to · Simplify and streamline the management of any large-scale or outsourced project · Overcome the challenges of using the RUP in software project management · Optimize software procurement and supplier relationships, from Request for Proposals (RFPs) and contracts to delivery · Staff high-performance project teams and project management offices · Establish productive, consistent development environments · Run effective project kickoffs · Systematically identify and mitigate project risks · Manage the technical and business challenges of changing requirements · Organize iterations and testing in incremental development processes · Transition new systems into service: from managing expectations to migrating data · Plan system maintenance and implement effective change control · Learn all you can from project post-mortems—and put those lessons into practice
Download or read book The New Language of Business written by Sandy Carter and published by Pearson Education. This book was released on 2007-02-02 with total page 445 pages. Available in PDF, EPUB and Kindle. Book excerpt: There is now a direct, provable link between an organization’s flexibility and business performance. To optimize flexibility, companies must achieve unprecedented levels of integration and automation of key processes and infrastructure, both internally and externally. At the same time, they must learn to manage their processes far more dynamically and responsively. They must become flex-pon-sive*. Until recently, technology stood in the way of achieving these goals. Thanks to the emergence of service oriented architecture (SOA), Web 2.0, and open standards, technology now enables companies to achieve those goals. In The New Language of Business, one of IBM’s top SOA strategist demonstrates how business leaders can use innovations in technology to drive dramatic process improvements and support accelerating change. Sandy Carter shows how to deconstruct your business into a “componentized” business model, then support that model with linked, repeatable IT services that can adapt quickly, easily, and economically. These techniques will help both IT professionals and business leaders reach new levels of operational excellence to deliver the market-focused innovations that matter most. Drive competitive advantage through Service Oriented Architecture Leverage the value of business process components and IT services Achieve one version of the truth—finally! Use information as a service to improve business insight and reduce risk Master SOA governance and the service lifecycle Manage IT infrastructure for business results, both short-term and long-term Start fast: choose from three winning approaches Get quick wins with business process management, collaboration or information Implement on demand: what works—and what doesn’t Discover key success factors—and ten critical mistakes to avoid
Download or read book Inescapable Data written by Chris Stakutis and published by FT Press. This book was released on 2005 with total page 306 pages. Available in PDF, EPUB and Kindle. Book excerpt: An intense look at the deep impact of communications, computing, and data storage convergance on society, government, and the individual. Rich with solid analysis and supported by insightful interviews with industry leaders, this book will provide a mapping of Pervasive Data to the future of information management and flow.
Download or read book Reaching The Goal written by John Arthur Ricketts and published by Pearson Education. This book was released on 2007-10-23 with total page 532 pages. Available in PDF, EPUB and Kindle. Book excerpt: “There is no doubt that this is a truly original and groundbreaking work in applying the Theory of Constraints. I run a services company and learned some things about the services business. Anyone involved in large services companies needs to look at what John is proposing. I will definitely quote this material frequently.” Chad Smith, Managing Partner, Constraints Management Group “The information presented in this book is badly needed by service providers who struggle to balance supply and demand with their resources.” Carol A. Ptak, CFPIM, CIRM “The techniques that John brings to light in this book are the bridge from the vision of Dr. Goldratt’s work to the successful implementation in a range of services firms.” From the Foreword by Erik Bush, Vice President, IBM Global Services Discover the powerful Theory of Constraints (TOC), and use it to drive continuous performance improvement in any services organization Identify the hidden constraints that are limiting your organization, and manage or eliminate them Use TOC to improve the way you manage resources, projects, processes, finance, marketing, and sales Determine whether your organization faces an internal or external constraint, manage that constraint accordingly, and anticipate where the next constraint will arise Release latent capacity shrouded by common business practices Simplify processes that have grown unmanageably complex Optimize your enterprise as a whole rather than suboptimizing individual business units Get buy-in to fundamental changes in strategy, tactics, and operations Managing services is extremely challenging, and traditional “industrial” management techniques are no longer adequate. In Reaching the Goal, Dr. John Arthur Ricketts presents a breakthrough management approach that embraces what makes services different: their diversity, complexity, and unique distribution methods. Ricketts draws on Eli Goldratt’s Theory of Constraints (TOC), one of this generation’s most successful management methodologies...thoroughly adapting it to the needs of today’s professional, scientific, and technical services businesses. He reveals how to identify the surprising constraints that limit your organization’s performance, execute more effectively within those constraints, and then loosen or even eliminate them. This book’s relentlessly practical techniques reflect several years of advanced IBM research and consulting with enterprise clients. Step-by-step, Ricketts shows how to apply them throughout your most crucial business functions...from project management to finance, process improvement to sales and marketing. Whatever your role in improving service delivery, processes, or profitability, this book gives you the tools to reach your goals...and go beyond them Identify, manage, and overcome your key constraints Five steps to uncovering and addressing the real obstacles to improved performance Optimize core business functions, one step at a time Improve the way you manage resources, projects, processes, finance, and marketing Implement TOC rapidly and effectively Get buy-in, deploy infrastructure, and provide the right IT support?
Download or read book Visual Modeling with IBM Rational Software Architect and UML written by Terry Quatrani and published by Prentice Hall Professional. This book was released on 2006 with total page 224 pages. Available in PDF, EPUB and Kindle. Book excerpt: "Terry's style is always direct, approachable, and pragmatic. Abstraction is hard, and visualizing abstractions is as well, but here she'll guide you in doing both using Rational Software Architect." --From the Foreword by Grady Booch, IBM Fellow Master UML 2.0 Visual Modeling with IBM Rational Software Architect Using IBM Rational Software Architect, you can unify all aspects of software design and development. It allows you to exploit new modeling language technology to architect systems more effectively and develop them more productively. Now, two of IBM's leading experts have written the definitive, start-to-finish guide to UML 2-based visual modeling with Rational Software Architect. You'll learn hands-on, using a simplified case study that's already helped thousands of professionals master analysis, design, and implementation with IBM Rational technologies. Renowned UML expert Terry Quatrani and J2EE/SOA evangelist Jim Palistrant walk you through visualizing all facets of system architecture at every stage of the project lifecycle. Whether you're an architect, developer, or project manager, you'll discover how to leverage IBM Rational's latest innovations to optimize any project. Coverage includes Making the most of model-driven development with Rational Software Architect's integrated design and development tools Understanding visual modeling: goals, techniques, language, and processes Beginning any visual modeling project: sound principles and best practices Capturing and documenting functional requirements with use case models Creating analysis models that begin to reveal your optimal system implementation Building design models that abstract your implementation model and source code Using implementation models to represent your system's physical composition, from subsystems to executables and data Transforming these models to actual running code The IBM Press developerWorks(R) Series is a unique undertaking in which print books and the Web are mutually supportive. The publications in this series are complemented by resources on the developerWorks Web site on ibm.com. Icons throughout the book alert the reader to these valuable resources.
Download or read book WebSphere Business Integration Primer written by Vinod Jessani and published by Pearson Education. This book was released on 2007-12-27 with total page 511 pages. Available in PDF, EPUB and Kindle. Book excerpt: Introductory Guide to WebSphere Business Integration from IBM Using WebSphere Business Integration (WBI) technology, you can build an enterprise-wide Business Integration (BI) infrastructure that makes it easier to connect any business resources and functions, so you can adapt more quickly to the demands of customers and partners. Now there’s an introductory guide to creating standards-based process and data integration solutions with WBI. WebSphere Business Integration Primer thoroughly explains Service Component Architecture (SCA), basic business processes, and complex long-running business flows, and guides you to choose the right process integration architecture for your requirements. Next, it introduces the key components of a WBI solution and shows how to make them work together rapidly and efficiently. This book will help developers, technical professionals, or managers understand today’s key BI issues and technologies, and streamline business processes by combining BI with Service Oriented Architecture (SOA). Coverage includes Linking BI, business process management (BPM), and SOA BI scenarios, architecture, patterns, and the IBM Business Object Framework Business orchestration utilizing WS-BPEL and other industry standards BI development with WebSphere Integration Developer (WID) and the SCA programming model WebSphere Process Server (WPS): a runtime for service-oriented applications Defining business maps, rules, business state machines, and human tasks Managing BI services: security, auditing, and more Integrating third-party and legacy systems with WebSphere adapters Utilizing WebSphere Business Modeler and WebSphere Business Monitor Using WebSphere Enterprise Service Bus (WESB) to integrate services
Download or read book Implementing ITIL Configuration Management written by Larry Klosterboer and published by Pearson Education. This book was released on 2007-12-28 with total page 445 pages. Available in PDF, EPUB and Kindle. Book excerpt: Practical, Real-World ITIL Configuration Management—From Start to Finish The IT Infrastructure Library® (ITIL) places the “best practices” in IT operations at your command. ITIL helps you make better technology choices, manages IT more effectively, and drives greater business value from all your IT investments. The core of ITIL is configuration management: the discipline of identifying, tracking, and controlling your IT environment’s diverse components to gain accurate and timely information for better decision-making. Now, there’s a practical, start-to-finish guide to ITIL configuration management for every IT leader, manager, and practitioner. ITIL-certified architect and solutions provider Larry Klosterboer helps you establish a clear roadmap for success, customize standard processes to your unique needs, and avoid the pitfalls that stand in your way. You’ll learn how to plan your implementation, deploy tools and processes, administer ongoing configuration management tasks, refine ITIL information, and leverage it for competitive advantage. Throughout, Klosterboer demystifies ITIL’s jargon, illuminates each technique with real-world advice and examples, and helps you focus on the specific techniques that offer maximum business value in your environment. Coverage includes Assessing your current configuration management maturity and setting goals for improvement Gathering and managing requirements to align ITIL with organizational needs Describing the schema of your configuration management database (CMDB) Identifying, capturing, and organizing configuration data Choosing the best tools for your requirements Integrating data and processes to create a unified logical CMDB and configuration management service Implementing pilot projects to demonstrate the value of configuration management and to test your planning Moving from a pilot to wide-scale enterprise deployment Defining roles for deployment and ongoing staffing Leveraging configuration management information: Reporting and beyond Measuring and improving CMDB data accuracy Covers ITIL version 3. Preface xvii Acknowledgments xxi About the Author xxiii Chapter 1: Overview of Configuration Management 1 Part I: Planning for Configuration Management 17 Chapter 2: Gathering and Analyzing Requirements 19 Chapter 3: Determining Scope, Span, and Granularity 37 Chapter 4: Customizing the Configuration Management Process 55 Chapter 5: Planning for Data Population 67 Chapter 6: Putting Together a Useful Project Plan 85 Part II: Implementing Configuration Management 97 Chapter 7: Choosing the Right Tools 99 Chapter 8: Implementing the Process 117 Chapter 9: Populating the Configuration Management Database 127 Chapter 10: Choosing and Running a Pilot Program 137 Chapter 11: Communication and Enterprise Roll Out 149 Part III: Running an Effective Configuration Management System 161 Chapter 12: Building a Configuration Management Team 163 Chapter 13: The Many Uses for Configuration Information 179 Chapter 14: Measuring and Improving CMDB Accuracy 193 Chapter 15: Improving the Business Value of Configuration Management 207 Index 217
Download or read book DB2 for z OS Version 8 DBA Certification Guide written by Susan Lawson and published by Pearson Education. This book was released on 2004-10-28 with total page 789 pages. Available in PDF, EPUB and Kindle. Book excerpt: A practical guide to DB2 z/OS database administration that is 100 percent focused on running DB2 in z/OS environments The only comprehensive preparation guide for the IBM Certified Database Administrator for DB2 Universal Database V8 z/OS certification Covers database planning, design, implementation, operation, recovery, security, performance, installation, migration, and more Sample test questions help you prepare for both IBM DB2 DBA Tests 700 and 702 IBM DB2 Universal Database Version 8 for z/OS offers enterprises unprecedented opportunities to integrate information, deliver it on demand, and manage it simply and cost-effectively. Now, one of the world's leading DB2 consultants presents the definitive guide to administering DB2 UDB V8 databases in z/OS environments. DB2 for z/OS Version 8 DBA Certification Guide also serves as a key tool for anyone preparing for IBM Certified Database Administrator for DB2 Universal Database V8 for z/OS certification. IBM Gold Consultant Susan Lawson presents hundreds of practical techniques, expert guidelines, and useful tips for every facet of DB2 UDB database administration, including database implementation, operation, recovery, security, auditing, performance, installation, migration, SQL, and more. Coverage includes Understanding the DB2 product family, architecture, attachments, and the DB2 z/OS environment Securing enterprise-class DB2 installations and applications Using SQL to create and manage database objects, and manipulate and retrieve information Mastering key DBA tasks, including loading, reorganizing, quiescing, repairing, and recovering data; recovering and rebuilding indexes; and gathering statistics Implementing data sharing in Parallel Sysplex environments Learning the fundamentals of DB2 application development from the DBA's perspective Leveraging advanced DB2 functions, including stored procedures and other object-relational extensions Optimizing DB2 applications and the DB2 engine for maximum performance Whether you are administering DB2 UDB V8 in z/OS environments, planning to do so, or preparing for DB2 UDB V8 DBA certification, DB2 for z/OS Version 8 DBA Certification Guide will be your single most valuable resource.
Download or read book A Practical Guide to Trusted Computing written by David Challener and published by Pearson Education. This book was released on 2007-12-27 with total page 415 pages. Available in PDF, EPUB and Kindle. Book excerpt: Use Trusted Computing to Make PCs Safer, More Secure, and More Reliable Every year, computer security threats become more severe. Software alone can no longer adequately defend against them: what’s needed is secure hardware. The Trusted Platform Module (TPM) makes that possible by providing a complete, open industry standard for implementing trusted computing hardware subsystems in PCs. Already available from virtually every leading PC manufacturer, TPM gives software professionals powerful new ways to protect their customers. Now, there’s a start-to-finish guide for every software professional and security specialist who wants to utilize this breakthrough security technology. Authored by innovators who helped create TPM and implement its leading-edge products, this practical book covers all facets of TPM technology: what it can achieve, how it works, and how to write applications for it. The authors offer deep, real-world insights into both TPM and the Trusted Computing Group (TCG) Software Stack. Then, to demonstrate how TPM can solve many of today’s most challenging security problems, they present four start-to-finish case studies, each with extensive C-based code examples. Coverage includes What services and capabilities are provided by TPMs TPM device drivers: solutions for code running in BIOS, TSS stacks for new operating systems, and memory-constrained environments Using TPM to enhance the security of a PC’s boot sequence Key management, in depth: key creation, storage, loading, migration, use, symmetric keys, and much more Linking PKCS#11 and TSS stacks to support applications with middleware services What you need to know about TPM and privacy--including how to avoid privacy problems Moving from TSS 1.1 to the new TSS 1.2 standard TPM and TSS command references and a complete function library