Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations
This book is a tutorial on, and a guide to the deployment of, Public-Key Infrastructures. It covers a broad range of material related to PKIs, including certification, operational considerations and standardization efforts, as well as deployment issues and considerations. Emphasis is placed on expla...
Gespeichert in:
Beteiligte Personen: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
[Erscheinungsort nicht ermittelbar]
Sams
1999
|
Ausgabe: | 1st edition. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/157870166X/?ar |
Zusammenfassung: | This book is a tutorial on, and a guide to the deployment of, Public-Key Infrastructures. It covers a broad range of material related to PKIs, including certification, operational considerations and standardization efforts, as well as deployment issues and considerations. Emphasis is placed on explaining the interrelated fields within the topic area, to assist those who will be responsible for making deployment decisions and architecting a PKI within an organization. |
Umfang: | 1 Online-Ressource (320 Seiten) |
ISBN: | 157870166X |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047373741 | ||
003 | DE-627-1 | ||
005 | 20240228120729.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s1999 xx |||||o 00| ||eng c | ||
020 | |a 157870166X |9 1-57870-166-X | ||
035 | |a (DE-627-1)047373741 | ||
035 | |a (DE-599)KEP047373741 | ||
035 | |a (ORHE)157870166X | ||
035 | |a (DE-627-1)047373741 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 21/eng/20230216 | |
100 | 1 | |a Adams, Carlisle |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Understanding Public-Key Infrastructure |b Concepts, Standards, and Deployment Considerations |c Adams, Carlisle |
250 | |a 1st edition. | ||
264 | 1 | |a [Erscheinungsort nicht ermittelbar] |b Sams |c 1999 | |
300 | |a 1 Online-Ressource (320 Seiten) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a This book is a tutorial on, and a guide to the deployment of, Public-Key Infrastructures. It covers a broad range of material related to PKIs, including certification, operational considerations and standardization efforts, as well as deployment issues and considerations. Emphasis is placed on explaining the interrelated fields within the topic area, to assist those who will be responsible for making deployment decisions and architecting a PKI within an organization. | ||
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Public key infrastructure (Computer security) | |
650 | 0 | |a Business enterprises |x Computer networks |x Security measures | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Infrastructure à clé publique (Sécurité informatique) | |
650 | 4 | |a Business enterprises ; Computer networks ; Security measures | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Public key infrastructure (Computer security) | |
700 | 1 | |a Lloyd, Steve |e VerfasserIn |4 aut | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/157870166X/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047373741 |
---|---|
_version_ | 1821494914962161664 |
adam_text | |
any_adam_object | |
author | Adams, Carlisle Lloyd, Steve |
author_facet | Adams, Carlisle Lloyd, Steve |
author_role | aut aut |
author_sort | Adams, Carlisle |
author_variant | c a ca s l sl |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047373741 (DE-599)KEP047373741 (ORHE)157870166X |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 1st edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02155cam a22004452 4500</leader><controlfield tag="001">ZDB-30-ORH-047373741</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120729.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s1999 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">157870166X</subfield><subfield code="9">1-57870-166-X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047373741</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047373741</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)157870166X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047373741</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21/eng/20230216</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Adams, Carlisle</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Understanding Public-Key Infrastructure</subfield><subfield code="b">Concepts, Standards, and Deployment Considerations</subfield><subfield code="c">Adams, Carlisle</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Erscheinungsort nicht ermittelbar]</subfield><subfield code="b">Sams</subfield><subfield code="c">1999</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (320 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book is a tutorial on, and a guide to the deployment of, Public-Key Infrastructures. It covers a broad range of material related to PKIs, including certification, operational considerations and standardization efforts, as well as deployment issues and considerations. Emphasis is placed on explaining the interrelated fields within the topic area, to assist those who will be responsible for making deployment decisions and architecting a PKI within an organization.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Public key infrastructure (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Infrastructure à clé publique (Sécurité informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises ; Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Public key infrastructure (Computer security)</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lloyd, Steve</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/157870166X/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047373741 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:21:57Z |
institution | BVB |
isbn | 157870166X |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (320 Seiten) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 1999 |
publishDateSearch | 1999 |
publishDateSort | 1999 |
publisher | Sams |
record_format | marc |
spelling | Adams, Carlisle VerfasserIn aut Understanding Public-Key Infrastructure Concepts, Standards, and Deployment Considerations Adams, Carlisle 1st edition. [Erscheinungsort nicht ermittelbar] Sams 1999 1 Online-Ressource (320 Seiten) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier This book is a tutorial on, and a guide to the deployment of, Public-Key Infrastructures. It covers a broad range of material related to PKIs, including certification, operational considerations and standardization efforts, as well as deployment issues and considerations. Emphasis is placed on explaining the interrelated fields within the topic area, to assist those who will be responsible for making deployment decisions and architecting a PKI within an organization. Computer networks Security measures Public key infrastructure (Computer security) Business enterprises Computer networks Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures Infrastructure à clé publique (Sécurité informatique) Business enterprises ; Computer networks ; Security measures Computer networks ; Security measures Lloyd, Steve VerfasserIn aut |
spellingShingle | Adams, Carlisle Lloyd, Steve Understanding Public-Key Infrastructure Concepts, Standards, and Deployment Considerations Computer networks Security measures Public key infrastructure (Computer security) Business enterprises Computer networks Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures Infrastructure à clé publique (Sécurité informatique) Business enterprises ; Computer networks ; Security measures Computer networks ; Security measures |
title | Understanding Public-Key Infrastructure Concepts, Standards, and Deployment Considerations |
title_auth | Understanding Public-Key Infrastructure Concepts, Standards, and Deployment Considerations |
title_exact_search | Understanding Public-Key Infrastructure Concepts, Standards, and Deployment Considerations |
title_full | Understanding Public-Key Infrastructure Concepts, Standards, and Deployment Considerations Adams, Carlisle |
title_fullStr | Understanding Public-Key Infrastructure Concepts, Standards, and Deployment Considerations Adams, Carlisle |
title_full_unstemmed | Understanding Public-Key Infrastructure Concepts, Standards, and Deployment Considerations Adams, Carlisle |
title_short | Understanding Public-Key Infrastructure |
title_sort | understanding public key infrastructure concepts standards and deployment considerations |
title_sub | Concepts, Standards, and Deployment Considerations |
topic | Computer networks Security measures Public key infrastructure (Computer security) Business enterprises Computer networks Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures Infrastructure à clé publique (Sécurité informatique) Business enterprises ; Computer networks ; Security measures Computer networks ; Security measures |
topic_facet | Computer networks Security measures Public key infrastructure (Computer security) Business enterprises Computer networks Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures Infrastructure à clé publique (Sécurité informatique) Business enterprises ; Computer networks ; Security measures Computer networks ; Security measures |
work_keys_str_mv | AT adamscarlisle understandingpublickeyinfrastructureconceptsstandardsanddeploymentconsiderations AT lloydsteve understandingpublickeyinfrastructureconceptsstandardsanddeploymentconsiderations |