This book provides an introduction to trusted computing technology and its applications. As computers are increasingly embedded and wireless connected, security becomes imperative. This has resulted in the development of the notion of a 'trusted platform', the main feature of which is the possession of a trusted hardware element capable of checking all or part of the software running on this platform. This new book introduces recent technological developments in trusted computing, and surveys the various current approaches to providing trusted platforms. The book includes application examples which are based on recent and ongoing research.