Understanding PKI: concepts, standards, and deployment considerations
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Buch |
Sprache: | Englisch |
Veröffentlicht: |
Boston
Addison-Wesley
2003
|
Ausgabe: | 2. ed. |
Schlagwörter: | |
Beschreibung: | Revised ed. of: Understanding public-key infrastructure |
Umfang: | XXVIII, 322 S. |
ISBN: | 0672323915 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV014595979 | ||
003 | DE-604 | ||
005 | 20080812 | ||
007 | t| | ||
008 | 020724s2003 xxu |||| 00||| eng d | ||
010 | |a 2002074687 | ||
020 | |a 0672323915 |9 0-672-32391-5 | ||
035 | |a (OCoLC)637021384 | ||
035 | |a (DE-599)BVBBV014595979 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-91G |a DE-92 |a DE-355 |a DE-522 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 |2 21 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a DAT 465f |2 stub | ||
100 | 1 | |a Adams, Carlisle |e Verfasser |4 aut | |
245 | 1 | 0 | |a Understanding PKI |b concepts, standards, and deployment considerations |c Carlisle Adams ; Steve Lloyd |
250 | |a 2. ed. | ||
264 | 1 | |a Boston |b Addison-Wesley |c 2003 | |
300 | |a XXVIII, 322 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Revised ed. of: Understanding public-key infrastructure | ||
650 | 7 | |a Coderingstheorie |2 gtt | |
650 | 7 | |a Computerbeveiliging |2 gtt | |
650 | 7 | |a Computernetwerken |2 gtt | |
650 | 4 | |a Unternehmen | |
650 | 4 | |a Business enterprises |x Computer networks |x Security measures | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Public key infrastructure (Computer security) | |
650 | 0 | 7 | |a Public-Key-Infrastruktur |0 (DE-588)4671762-6 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Public-Key-Infrastruktur |0 (DE-588)4671762-6 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Lloyd, Steve |e Sonstige |4 oth | |
700 | 1 | |a Adams, Carlisle |e Sonstige |4 oth | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-009920660 |
Datensatz im Suchindex
DE-BY-TUM_call_number | 0102 DAT 465f 2001 A 5118(2) |
---|---|
DE-BY-TUM_katkey | 1362756 |
DE-BY-TUM_location | 01 |
DE-BY-TUM_media_number | 040020139664 040020126998 |
_version_ | 1821932671719178242 |
any_adam_object | |
author | Adams, Carlisle |
author_facet | Adams, Carlisle |
author_role | aut |
author_sort | Adams, Carlisle |
author_variant | c a ca |
building | Verbundindex |
bvnumber | BV014595979 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 276 |
classification_tum | DAT 465f |
ctrlnum | (OCoLC)637021384 (DE-599)BVBBV014595979 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 2. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01627nam a2200493 c 4500</leader><controlfield tag="001">BV014595979</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20080812 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">020724s2003 xxu |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2002074687</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0672323915</subfield><subfield code="9">0-672-32391-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)637021384</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV014595979</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-522</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Adams, Carlisle</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Understanding PKI</subfield><subfield code="b">concepts, standards, and deployment considerations</subfield><subfield code="c">Carlisle Adams ; Steve Lloyd</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston</subfield><subfield code="b">Addison-Wesley</subfield><subfield code="c">2003</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXVIII, 322 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Revised ed. of: Understanding public-key infrastructure</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Coderingstheorie</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computerbeveiliging</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computernetwerken</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Unternehmen</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Public key infrastructure (Computer security)</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Public-Key-Infrastruktur</subfield><subfield code="0">(DE-588)4671762-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Public-Key-Infrastruktur</subfield><subfield code="0">(DE-588)4671762-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lloyd, Steve</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Adams, Carlisle</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-009920660</subfield></datafield></record></collection> |
id | DE-604.BV014595979 |
illustrated | Not Illustrated |
indexdate | 2024-12-20T11:05:29Z |
institution | BVB |
isbn | 0672323915 |
language | English |
lccn | 2002074687 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-009920660 |
oclc_num | 637021384 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM DE-92 DE-355 DE-BY-UBR DE-522 |
owner_facet | DE-91G DE-BY-TUM DE-92 DE-355 DE-BY-UBR DE-522 |
physical | XXVIII, 322 S. |
publishDate | 2003 |
publishDateSearch | 2003 |
publishDateSort | 2003 |
publisher | Addison-Wesley |
record_format | marc |
spellingShingle | Adams, Carlisle Understanding PKI concepts, standards, and deployment considerations Coderingstheorie gtt Computerbeveiliging gtt Computernetwerken gtt Unternehmen Business enterprises Computer networks Security measures Computer networks Security measures Public key infrastructure (Computer security) Public-Key-Infrastruktur (DE-588)4671762-6 gnd |
subject_GND | (DE-588)4671762-6 |
title | Understanding PKI concepts, standards, and deployment considerations |
title_auth | Understanding PKI concepts, standards, and deployment considerations |
title_exact_search | Understanding PKI concepts, standards, and deployment considerations |
title_full | Understanding PKI concepts, standards, and deployment considerations Carlisle Adams ; Steve Lloyd |
title_fullStr | Understanding PKI concepts, standards, and deployment considerations Carlisle Adams ; Steve Lloyd |
title_full_unstemmed | Understanding PKI concepts, standards, and deployment considerations Carlisle Adams ; Steve Lloyd |
title_short | Understanding PKI |
title_sort | understanding pki concepts standards and deployment considerations |
title_sub | concepts, standards, and deployment considerations |
topic | Coderingstheorie gtt Computerbeveiliging gtt Computernetwerken gtt Unternehmen Business enterprises Computer networks Security measures Computer networks Security measures Public key infrastructure (Computer security) Public-Key-Infrastruktur (DE-588)4671762-6 gnd |
topic_facet | Coderingstheorie Computerbeveiliging Computernetwerken Unternehmen Business enterprises Computer networks Security measures Computer networks Security measures Public key infrastructure (Computer security) Public-Key-Infrastruktur |
work_keys_str_mv | AT adamscarlisle understandingpkiconceptsstandardsanddeploymentconsiderations AT lloydsteve understandingpkiconceptsstandardsanddeploymentconsiderations |
Paper/Kapitel scannen lassen
Teilbibliothek Mathematik & Informatik
Signatur: |
0102 DAT 465f 2001 A 5118(2)
Lageplan |
---|---|
Exemplar 1 | Ausleihbar Am Standort |
Exemplar 2 | Ausleihbar Am Standort |