We can't find the internet
Attempting to reconnect
Something went wrong!
Hang in there while we get back on track
£96.31
Springer Trusted Computing Platforms: TPM2.0 in Context
Price data last checked 8 day(s) ago - will refresh soon
We'll watch every seller, every day. One email when your price arrives.
About as cheap as it gets. The only time it was cheaper was 2 months ago.
£96 today · all-time low £96 (Feb 2026) · usually £96
NEW HERE?
Amazon shows you one price. We show you all of them.
Tosheroon watches Amazon prices so you don't have to. Every product on Amazon has a price history — we make it visible. Set the price you'd actually pay, and we'll email you the second it gets there. No app, no account, one email.
WHAT'S ON THIS PAGE
when this has been cheap or pricey
where the price is heading next
all-time high & low, recent range
name your number, we'll email you
Price History & Forecast
Grey patches = out of stock. Cheaper = lower on the chart. Hover for exact prices.
Last 83 days • 83 data points (No recent data available)
Price Distribution
Price distribution over 83 days • 3 price levels
Price Analysis
Most common price: £96 (63 days, 75.9%)
Price range: £96 - £117
Price levels: 3 different prices over 83 days
Description
Product Specifications
- Brand
- Springer
- Format
- hardcover
- ASIN
- 3319087436
- Domain
- Amazon UK
- Release Date
- 21 January 2015
- Listed Since
- 03 July 2014
Barcode
No barcode data available
Similar Products You Might Like
Trusted Computing Platforms: TPM2.0 in Context
Springer
Trusted Computing Platforms: Design and Applications
Springer
TPM Inspection Cards Set
CRC Press
Trusted Computing Platforms: Design and Applications
Springer
Classical and Physical Security of Symmetric Key Cryptographic Algorithms (Computer Architecture and Design Methodologies)
Springer
Trustworthy Computing and Services: International Conference, ISCTCS 2012, Beijing, China, May/June 2012, Revised Selected Papers: 320 (Communications in Computer and Information Science, 320)
Springer
Trust Management VII: 7th IFIP WG 11.11 International Conference, IFIPTM 2013, Malaga, Spain, June 3-7, 2013, Proceedings: 401 (IFIP Advances in Information and Communication Technology, 401)
Springer
Introduction to Hardware Security and Trust
Springer
Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
Wiley
Autonomic and Trusted Computing: Third International Conference, ATC 2006, Wuhan, China, September 3-6, 2006: 4158 (Lecture Notes in Computer Science, 4158)
Springer
Trusted Digital Circuits: Hardware Trojan Vulnerabilities, Prevention and Detection
Springer
System-on-Chip Security: Validation and Verification
Springer
Trust Management XI: 11th IFIP WG 11.11 International Conference, IFIPTM 2017, Gothenburg, Sweden, June 12-16, 2017, Proceedings: 505 (IFIP Advances in Information and Communication Technology, 505)
Springer
Theoretical Computer Science: Introduction to Automata, Computability, Complexity, Algorithmics, Randomization, Communication, and Cryptography
Springer
Trust Management III: Third IFIP WG 11.11 International Conference, IFIPTM 2009, West Lafayette, IN, USA, June 15-19, 2009, Proceedings: 300 (IFIP ... and Communication Technology, 300)
Springer
Cryptography for Security and Privacy in Cloud Computing (Artech House Information Security and Privacy)
Artech House
Physically Unclonable Functions: From Basic Design Principles to Advanced Hardware Security Applications
Springer
Modeling and Analyzing Security Protocols with Tamarin: A Comprehensive Guide (Information Security and Cryptography)
Springer
Theory of Cryptography: 23rd International Conference, TCC 2025, Aarhus, Denmark, December 1–5, 2025, Proceedings, Part II (Lecture Notes in Computer Science, 16269)
Springer
The Hardware Trojan War: Attacks, Myths, and Defenses
Springer
Trust Management in Mobile Environments: Autonomic and Usable Models (Advances in Information Security, Privacy, and Ethics)
Information Science Reference
Controlling Privacy and the Use of Data Assets - Volume 1: Who Owns the New Oil? (Security, Audit and Leadership Series)
CRC Press
Fault Tolerant Architectures for Cryptography and Hardware Security (Computer Architecture and Design Methodologies)
Springer
Computer Security in the 21st Century
Springer