Cargando…

Understanding PKI : Concepts, Standards, and Deployment Considerations, Second Edition /

PKI (public-key infrastructure) enables the secure exchange of data over otherwise unsecured media, such as the Internet. PKI is the underlying cryptographic security mechanism for digital certificates and certificate directories, which are used to authenticate a message sender. Because PKI is the s...

Descripción completa

Detalles Bibliográficos
Autores principales: Adams, Carlisle (Autor), Lloyd, Steve (Autor)
Autor Corporativo: Safari, an O'Reilly Media Company
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Addison-Wesley Professional, 2002.
Edición:2nd edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ma 4500
001 OR_on1112922989
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 150904s2002 xx o 000 0 eng d
040 |a UKBTH  |b eng  |e pn  |c UKBTH  |d OCLCO  |d OCLCF  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ 
020 |z 9780672323911 
020 |z 0672323915 
024 8 |a 9780672323911 
024 8 |a 0672323915 
029 1 |a AU@  |b 000067103377 
035 |a (OCoLC)1112922989 
049 |a UAMI 
100 1 |a Adams, Carlisle,  |e author. 
245 1 0 |a Understanding PKI :  |b Concepts, Standards, and Deployment Considerations, Second Edition /  |c Adams, Carlisle. 
250 |a 2nd edition. 
264 1 |b Addison-Wesley Professional,  |c 2002. 
300 |a 1 online resource (352 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
365 |b 64.99 
520 |a PKI (public-key infrastructure) enables the secure exchange of data over otherwise unsecured media, such as the Internet. PKI is the underlying cryptographic security mechanism for digital certificates and certificate directories, which are used to authenticate a message sender. Because PKI is the standard for authenticating commercial electronic transactions, Understanding PKI, Second Edition, provides network and security architects with the tools they need to grasp each phase of the key/certificate life cycle, including generation, publication, deployment, and recovery. 
542 |f Copyright © 2003 by Pearson Education, Inc.  |g 2003 
550 |a Made available through: Safari, an O'Reilly Media Company. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Information technology  |x Security measures. 
650 0 |a Computer security  |x Management. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Data protection. 
650 6 |a Technologie de l'information  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique  |x Gestion. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Protection de l'information (Informatique) 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security  |x Management.  |2 fast  |0 (OCoLC)fst00872493 
650 7 |a Data protection.  |2 fast  |0 (OCoLC)fst00887958 
650 7 |a Information technology  |x Security measures.  |2 fast  |0 (OCoLC)fst00973129 
700 1 |a Lloyd, Steve,  |e author  |0 http://viaf.org/viaf/sourceID/LC%7cno00018826 
710 2 |a Safari, an O'Reilly Media Company. 
856 4 0 |u https://learning.oreilly.com/library/view/~/0672323915/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP