Understanding PKI: Concepts, Standards, and Deployment Considerations, Second Edition
PKI (public-key infrastructure) enables the secure exchange of data over otherwise unsecured media, such as the Internet. PKI is the underlying cryptographic security mechanism for digital certificates and certificate directories, which are used to authenticate a message sender. Because PKI is the s...
Gespeichert in:
Beteiligte Personen: | , |
---|---|
Körperschaft: | |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
[Erscheinungsort nicht ermittelbar]
Addison-Wesley Professional
2002
|
Ausgabe: | 2nd edition. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/0672323915/?ar |
Zusammenfassung: | PKI (public-key infrastructure) enables the secure exchange of data over otherwise unsecured media, such as the Internet. PKI is the underlying cryptographic security mechanism for digital certificates and certificate directories, which are used to authenticate a message sender. Because PKI is the standard for authenticating commercial electronic transactions, Understanding PKI, Second Edition, provides network and security architects with the tools they need to grasp each phase of the key/certificate life cycle, including generation, publication, deployment, and recovery. |
Umfang: | 1 Online-Ressource (352 Seiten) |
ISBN: | 0672323915 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047347341 | ||
003 | DE-627-1 | ||
005 | 20240228120843.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2002 xx |||||o 00| ||eng c | ||
020 | |a 0672323915 |9 0-672-32391-5 | ||
035 | |a (DE-627-1)047347341 | ||
035 | |a (DE-599)KEP047347341 | ||
035 | |a (ORHE)0672323915 | ||
035 | |a (DE-627-1)047347341 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
100 | 1 | |a Adams, Carlisle |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Understanding PKI |b Concepts, Standards, and Deployment Considerations, Second Edition |c Adams, Carlisle |
250 | |a 2nd edition. | ||
264 | 1 | |a [Erscheinungsort nicht ermittelbar] |b Addison-Wesley Professional |c 2002 | |
300 | |a 1 Online-Ressource (352 Seiten) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a PKI (public-key infrastructure) enables the secure exchange of data over otherwise unsecured media, such as the Internet. PKI is the underlying cryptographic security mechanism for digital certificates and certificate directories, which are used to authenticate a message sender. Because PKI is the standard for authenticating commercial electronic transactions, Understanding PKI, Second Edition, provides network and security architects with the tools they need to grasp each phase of the key/certificate life cycle, including generation, publication, deployment, and recovery. | ||
650 | 0 | |a Information technology |x Security measures | |
650 | 0 | |a Computer security |x Management | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Data protection | |
650 | 4 | |a Technologie de l'information ; Sécurité ; Mesures | |
650 | 4 | |a Sécurité informatique ; Gestion | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Protection de l'information (Informatique) | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security ; Management | |
650 | 4 | |a Data protection | |
650 | 4 | |a Information technology ; Security measures | |
700 | 1 | |a Lloyd, Steve |e VerfasserIn |4 aut | |
710 | 2 | |a Safari, an O'Reilly Media Company. |e MitwirkendeR |4 ctb | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/0672323915/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047347341 |
---|---|
_version_ | 1821494919526612992 |
adam_text | |
any_adam_object | |
author | Adams, Carlisle Lloyd, Steve |
author_corporate | Safari, an O'Reilly Media Company |
author_corporate_role | ctb |
author_facet | Adams, Carlisle Lloyd, Steve Safari, an O'Reilly Media Company |
author_role | aut aut |
author_sort | Adams, Carlisle |
author_variant | c a ca s l sl |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047347341 (DE-599)KEP047347341 (ORHE)0672323915 |
edition | 2nd edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02412cam a22004932 4500</leader><controlfield tag="001">ZDB-30-ORH-047347341</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120843.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2002 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0672323915</subfield><subfield code="9">0-672-32391-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047347341</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047347341</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)0672323915</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047347341</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Adams, Carlisle</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Understanding PKI</subfield><subfield code="b">Concepts, Standards, and Deployment Considerations, Second Edition</subfield><subfield code="c">Adams, Carlisle</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2nd edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Erscheinungsort nicht ermittelbar]</subfield><subfield code="b">Addison-Wesley Professional</subfield><subfield code="c">2002</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (352 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">PKI (public-key infrastructure) enables the secure exchange of data over otherwise unsecured media, such as the Internet. PKI is the underlying cryptographic security mechanism for digital certificates and certificate directories, which are used to authenticate a message sender. Because PKI is the standard for authenticating commercial electronic transactions, Understanding PKI, Second Edition, provides network and security architects with the tools they need to grasp each phase of the key/certificate life cycle, including generation, publication, deployment, and recovery.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information technology</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Management</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Technologie de l'information ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique ; Gestion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Protection de l'information (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security ; Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology ; Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lloyd, Steve</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Safari, an O'Reilly Media Company.</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/0672323915/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047347341 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:22:02Z |
institution | BVB |
isbn | 0672323915 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (352 Seiten) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2002 |
publishDateSearch | 2002 |
publishDateSort | 2002 |
publisher | Addison-Wesley Professional |
record_format | marc |
spelling | Adams, Carlisle VerfasserIn aut Understanding PKI Concepts, Standards, and Deployment Considerations, Second Edition Adams, Carlisle 2nd edition. [Erscheinungsort nicht ermittelbar] Addison-Wesley Professional 2002 1 Online-Ressource (352 Seiten) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier PKI (public-key infrastructure) enables the secure exchange of data over otherwise unsecured media, such as the Internet. PKI is the underlying cryptographic security mechanism for digital certificates and certificate directories, which are used to authenticate a message sender. Because PKI is the standard for authenticating commercial electronic transactions, Understanding PKI, Second Edition, provides network and security architects with the tools they need to grasp each phase of the key/certificate life cycle, including generation, publication, deployment, and recovery. Information technology Security measures Computer security Management Computer networks Security measures Data protection Technologie de l'information ; Sécurité ; Mesures Sécurité informatique ; Gestion Réseaux d'ordinateurs ; Sécurité ; Mesures Protection de l'information (Informatique) Computer networks ; Security measures Computer security ; Management Information technology ; Security measures Lloyd, Steve VerfasserIn aut Safari, an O'Reilly Media Company. MitwirkendeR ctb |
spellingShingle | Adams, Carlisle Lloyd, Steve Understanding PKI Concepts, Standards, and Deployment Considerations, Second Edition Information technology Security measures Computer security Management Computer networks Security measures Data protection Technologie de l'information ; Sécurité ; Mesures Sécurité informatique ; Gestion Réseaux d'ordinateurs ; Sécurité ; Mesures Protection de l'information (Informatique) Computer networks ; Security measures Computer security ; Management Information technology ; Security measures |
title | Understanding PKI Concepts, Standards, and Deployment Considerations, Second Edition |
title_auth | Understanding PKI Concepts, Standards, and Deployment Considerations, Second Edition |
title_exact_search | Understanding PKI Concepts, Standards, and Deployment Considerations, Second Edition |
title_full | Understanding PKI Concepts, Standards, and Deployment Considerations, Second Edition Adams, Carlisle |
title_fullStr | Understanding PKI Concepts, Standards, and Deployment Considerations, Second Edition Adams, Carlisle |
title_full_unstemmed | Understanding PKI Concepts, Standards, and Deployment Considerations, Second Edition Adams, Carlisle |
title_short | Understanding PKI |
title_sort | understanding pki concepts standards and deployment considerations second edition |
title_sub | Concepts, Standards, and Deployment Considerations, Second Edition |
topic | Information technology Security measures Computer security Management Computer networks Security measures Data protection Technologie de l'information ; Sécurité ; Mesures Sécurité informatique ; Gestion Réseaux d'ordinateurs ; Sécurité ; Mesures Protection de l'information (Informatique) Computer networks ; Security measures Computer security ; Management Information technology ; Security measures |
topic_facet | Information technology Security measures Computer security Management Computer networks Security measures Data protection Technologie de l'information ; Sécurité ; Mesures Sécurité informatique ; Gestion Réseaux d'ordinateurs ; Sécurité ; Mesures Protection de l'information (Informatique) Computer networks ; Security measures Computer security ; Management Information technology ; Security measures |
work_keys_str_mv | AT adamscarlisle understandingpkiconceptsstandardsanddeploymentconsiderationssecondedition AT lloydsteve understandingpkiconceptsstandardsanddeploymentconsiderationssecondedition AT safarianoreillymediacompany understandingpkiconceptsstandardsanddeploymentconsiderationssecondedition |