This book covers the effort of Intel to embed security technology in hardware. In detail, it introduces a tour of the embedded engine, exploring its internal architecture, security models and design details.
JoMa RuAn
Xing Ruan
Ruan Ming
Xiaoyu Weng
Xiaoyu Wang
Jiening Ruan
Jiening Ruan
Xiaoyu Xia
Meihui Ruan
Hang Ruan
Fang Fu Ruan
Ruan, Yicheng
Ruan wen jun
Yuzhen Ruan
Fang Ruan
Ruán O'Donnell
Jizheng Ruan
Zhifu Ruan
Shengheng Ruan
Haogen Ruan
Yisan Ruan
Zhangjing Ruan
Ruán O'Donnell
Nong ye bu ruan ke xue wei yuan hui (China). Ke ti zu
Ruan O'Donnell
Da Ruan
Xiaoyu
Jiaxin Ruan
Zhangjing Ruan
Wuming Ruan
Paula Berinstein
Lawrence S. Meyers
Christine Abernathy
Peter Chrisp
Cindy Rinfret
Phil Vischer
Stanley Gibbons
Christopher J.H. Wright
Sissel-Jo Gazan
Jill Trickett
Michael Livingston
Doreen Chesebro
Ed Gorman
F. R. Buckley
Laura Anne Gilman
Jacqueline Druga
Hannah C. Hall
Steve Rasnic Tem
C. S. Lewis
Daniel Meurois
Gordon R. Dickson
Jessica Spotswood
William Horwood
Jack McDevitt
Educational Testing Service
Vaughn Heppner
Annie Nicholas
Steve Conoboy
Steven Barnes
H. G. Wells
Zhang nai er
He xin ming
Xuecun Murong
Elisabeth Waters
Joe Mynhardt
Thomas L. Friedman
Sierra Dean
Jennifer Nault
Elizabeth Stewart
John Goldner
Jan Ormerod
Dwight R. Schuh
Ellen Vacco
Mira T. Lee
Ellice McDonald
Austen, Jane