|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_ocn951429268 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
160608s2015 flua ob 000 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d OCLCO
|d OCLCF
|d OCLCO
|d DEBBG
|d DEBSZ
|d CEF
|d OCLCQ
|d UAB
|d K6U
|d OCLCO
|d TYFRS
|d OCLCO
|d OCLCQ
|d OCLCO
|
020 |
|
|
|a 9781498788212
|
020 |
|
|
|a 1498788211
|
020 |
|
|
|a 9781498707480
|
020 |
|
|
|a 1498707483
|
020 |
|
|
|a 1498707475
|
020 |
|
|
|a 9781498707473
|
020 |
|
|
|z 9781498707473
|
029 |
1 |
|
|a DEBBG
|b BV043969523
|
029 |
1 |
|
|a DEBSZ
|b 485800497
|
029 |
1 |
|
|a GBVCP
|b 882756192
|
035 |
|
|
|a (OCoLC)951429268
|
037 |
|
|
|a CL0500000747
|b Safari Books Online
|
037 |
|
|
|a 9780429160332
|b Taylor & Francis
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Stapleton, Jeffrey James,
|e author.
|
245 |
1 |
0 |
|a Security without obscurity :
|b a guide to PKI operations /
|c Jeff Stapleton, W. Clay Epstein.
|
246 |
3 |
0 |
|a Guide to PKI operations
|
246 |
3 |
|
|a Guide to Public key infrastructure operations
|
264 |
|
1 |
|a Boca Raton, FL :
|b CRC Press,
|c [2015]
|
264 |
|
4 |
|c ©2015
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Online resource; title from title page (Safari, viewed June 7, 2016).
|
504 |
|
|
|a Includes bibliographical references.
|
505 |
0 |
|
|a Introduction -- Cryptography basics -- PKI building blocks -- PKI management and security -- PKI roles and responsibilities -- Security considerations -- Operational considerations -- Incident management -- PKI governance, risk, and compliance -- Advanced PKI.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Public key infrastructure (Computer security)
|
650 |
|
0 |
|a Data protection
|x Standards.
|
650 |
|
0 |
|a Information technology
|x Security measures.
|
650 |
|
6 |
|a Infrastructure à clé publique (Sécurité informatique)
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|v Normes.
|
650 |
|
6 |
|a Technologie de l'information
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|x Normes.
|
650 |
|
7 |
|a Data protection
|x Standards
|2 fast
|
650 |
|
7 |
|a Information technology
|x Security measures
|2 fast
|
650 |
|
7 |
|a Public key infrastructure (Computer security)
|2 fast
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781498788212/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|