Over the past years, Public Key Infrastructure (PKI) technology has evolved and moved from the research laboratories to the mainstream, in which many organizations are now leveraging it as part of their core infrastructure system for providing and building security in their businesses. Understanding the challenges and requirements of PKI related operations through the sharing of case studies are critical to supporting the continued research and development of PKI technologies and related systems and applications to further progress and innovate for enhancing future development and evolution of PKI in the enterprises. This publication includes topics such as: PKI Operation & Case Study, Non-repudiation, Authorization & Access Control, Authentication & Time-Stamping, Certificate Validation & Revocation, and Cryptographic Applications.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
Over the past years, Public Key Infrastructure (PKI) technology has evolved and moved from the research laboratories to the mainstream, in which many organizations are now leveraging it as part of their core infrastructure system for providing and building security in their businesses. Understanding the challenges and requirements of PKI related operations through the sharing of case studies are critical to supporting the continued research and development of PKI technologies and related systems and applications to further progress and innovate for enhancing future development and evolution of PKI in the enterprises. This publication includes topics such as: PKI Operation & Case Study; Non-repudiation; Authorization & Access Control, Authentication & Time-Stamping, Certificate Validation & Revocation and Cryptographic Applications.
Over the past years, Public Key Infrastructure (PKI) technology has evolved and moved from the research laboratories to the mainstream, in which many organizations are now leveraging it as part of their core infrastructure system for providing and building security in their businesses. Understanding the challenges and requirements of PKI related operations through the sharing of case studies are critical to supporting the continued research and development of PKI technologies and related systems and applications to further progress and innovate for enhancing future development and evolution of PKI in the enterprises. This publication includes topics such as: PKI Operation & Case Study; Non-repudiation; Authorization & Access Control, Authentication & Time-Stamping, Certificate Validation & Revocation and Cryptographic Applications.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
EUR 28,82 für den Versand von Vereinigtes Königreich nach USA
Versandziele, Kosten & DauerEUR 3,42 für den Versand innerhalb von/der USA
Versandziele, Kosten & DauerAnbieter: Books Puddle, New York, NY, USA
Zustand: New. pp. x + 265 Index. Bestandsnummer des Verkäufers 2650379383
Anzahl: 1 verfügbar
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
Zustand: New. pp. x + 265 Illus. Bestandsnummer des Verkäufers 58131880
Anzahl: 1 verfügbar
Anbieter: Biblios, Frankfurt am main, HESSE, Deutschland
Zustand: New. pp. x + 265. Bestandsnummer des Verkäufers 1850379389
Anzahl: 1 verfügbar
Anbieter: Aragon Books Canada, OTTAWA, ON, Kanada
Zustand: New. Bestandsnummer des Verkäufers QCU--0130
Anzahl: 1 verfügbar
Anbieter: Mispah books, Redhill, SURRE, Vereinigtes Königreich
Hardcover. Zustand: Like New. Like New. book. Bestandsnummer des Verkäufers ERICA79015860355096
Anzahl: 1 verfügbar