|
|
|
|
LEADER |
00000cam a2200000Ma 4500 |
001 |
OR_on1112922989 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
150904s2002 xx o 000 0 eng d |
040 |
|
|
|a UKBTH
|b eng
|e pn
|c UKBTH
|d OCLCO
|d OCLCF
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|
020 |
|
|
|z 9780672323911
|
020 |
|
|
|z 0672323915
|
024 |
8 |
|
|a 9780672323911
|
024 |
8 |
|
|a 0672323915
|
029 |
1 |
|
|a AU@
|b 000067103377
|
035 |
|
|
|a (OCoLC)1112922989
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Adams, Carlisle,
|e author.
|
245 |
1 |
0 |
|a Understanding PKI :
|b Concepts, Standards, and Deployment Considerations, Second Edition /
|c Adams, Carlisle.
|
250 |
|
|
|a 2nd edition.
|
264 |
|
1 |
|b Addison-Wesley Professional,
|c 2002.
|
300 |
|
|
|a 1 online resource (352 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
365 |
|
|
|b 64.99
|
520 |
|
|
|a PKI (public-key infrastructure) enables the secure exchange of data over otherwise unsecured media, such as the Internet. PKI is the underlying cryptographic security mechanism for digital certificates and certificate directories, which are used to authenticate a message sender. Because PKI is the standard for authenticating commercial electronic transactions, Understanding PKI, Second Edition, provides network and security architects with the tools they need to grasp each phase of the key/certificate life cycle, including generation, publication, deployment, and recovery.
|
542 |
|
|
|f Copyright © 2003 by Pearson Education, Inc.
|g 2003
|
550 |
|
|
|a Made available through: Safari, an O'Reilly Media Company.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Information technology
|x Security measures.
|
650 |
|
0 |
|a Computer security
|x Management.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
6 |
|a Technologie de l'information
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique
|x Gestion.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security
|x Management.
|2 fast
|0 (OCoLC)fst00872493
|
650 |
|
7 |
|a Data protection.
|2 fast
|0 (OCoLC)fst00887958
|
650 |
|
7 |
|a Information technology
|x Security measures.
|2 fast
|0 (OCoLC)fst00973129
|
700 |
1 |
|
|a Lloyd, Steve,
|e author
|0 http://viaf.org/viaf/sourceID/LC%7cno00018826
|
710 |
2 |
|
|a Safari, an O'Reilly Media Company.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/0672323915/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|