Explore: Public Key Infrastructure (computer Security)
Discover books, insights, and more — all in one place.
Learn more about Public Key Infrastructure (computer Security) with top reads curated from trusted sources — all in one place.
AI-Generated Overview About “public-key-infrastructure-%28computer-security%29”:
Books Results
Source: The Open Library
The Open Library Search Results
Search results from The Open Library
1Trust, privacy and security in digital business
By TrustBus 2007 (2007 Regensburg, Germany)

“Trust, privacy and security in digital business” Metadata:
- Title: ➤ Trust, privacy and security in digital business
- Author: ➤ TrustBus 2007 (2007 Regensburg, Germany)
- Language: English
- Number of Pages: Median: 289
- Publisher: Springer
- Publish Date: 2007
- Publish Location: Berlin - New York
“Trust, privacy and security in digital business” Subjects and Themes:
- Subjects: ➤ Congresses - Security measures - Business enterprises - Public key infrastructure (Computer security) - Electronic commerce - Computer networks - Data transmission systems - Data encryption (Computer science) - Management information systems - Information networks - Data protection - Computer science - Informatique - Business enterprises, computer networks - Computer security - Computers & the internet - General
Edition Identifiers:
- The Open Library ID: OL16152111M
- Online Computer Library Center (OCLC) ID: 166763964
- Library of Congress Control Number (LCCN): 2007933177
- All ISBNs: 3540744088 - 9783540744085
Access and General Info:
- First Year Published: 2007
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Trust, privacy and security in digital business at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
2Introduction to the public key infrastructure for the Internet
By Messaoud Benantar

“Introduction to the public key infrastructure for the Internet” Metadata:
- Title: ➤ Introduction to the public key infrastructure for the Internet
- Author: Messaoud Benantar
- Language: English
- Number of Pages: Median: 254
- Publisher: Prentice Hall PTR
- Publish Date: 2002
- Publish Location: Upper Saddle River, NJ
“Introduction to the public key infrastructure for the Internet” Subjects and Themes:
- Subjects: ➤ Computer networks - Internet - Public key infrastructure (Computer security) - Security measures - Internet programming - Public key Infrastructure (Computer security)
Edition Identifiers:
- The Open Library ID: OL3581314M
- Online Computer Library Center (OCLC) ID: 48362984
- Library of Congress Control Number (LCCN): 2002277544
- All ISBNs: 9780130609274 - 0130609277
Access and General Info:
- First Year Published: 2002
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Introduction to the public key infrastructure for the Internet at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
3Information security
By United States. General Accounting Office
“Information security” Metadata:
- Title: Information security
- Author: ➤ United States. General Accounting Office
- Language: English
- Number of Pages: Median: 32
- Publisher: ➤ U.S. General Accounting Office - The Office [distributor - United States General Accounting Office - The Office - U.S. GAO
- Publish Date: ➤ 1987 - 1989 - 1990 - 1991 - 1996 - 1998 - 1999 - 2000 - 2001 - 2002 - 2004
- Publish Location: ➤ Washington, DC - Washington, D.C. (P.O. Box 37050, Washington 20013) - Gaithersburg, MD (P.O. Box 6015, Gaithersburg 20877) - Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013) - Washington, D.C - Gaithersburg, Md. (P.O. Box 6015, Gaithersburg 20877) - Washington D.C. (P.O. Box 37050, Washington D.C. 20013)
“Information security” Subjects and Themes:
- Subjects: ➤ Access control - Administrative agencies - Agriculture - Armed Forces - Auditing - Automation - B-2 bomber - Classified Defense information - Communication systems - Computer networks - Computer security - Confidential communications - Congresses - Correspondence - Data processing - Data protection - Databases - Disclosure of information - District of Columbia Highway Trust Fund - Electronic filing systems - Electronic government information - Evaluation - Finance - Government communication systems - Information Systems - Information resources management - Information services - Law and legislation - National security - Northrop Corporation - Northrop Corporation. Advanced Systems Division - Official secrets - Officials and employees - Presidents - Public key infrastructure (Computer security) - Research - Roads - Security classification (Government documents) - Security measures - Staff - Tax returns - Telecommunication - United States - United States Dept. of Agriculture - United States. Dept. of Agriculture - United States. Dept. of Defense - United States. Dept. of Energy - United States. Dept. of the Interior - United States. Internal Revenue Service - United States. National Aeronautics and Space Administration - United States. Department of Energy - United States. Department of Defense - Information systems - United States. Department of the Interior - United States Department of Agriculture
- Places: America - United States - Washington (D.C.)
Edition Identifiers:
- The Open Library ID: ➤ OL14537760M - OL3996142M - OL14499506M - OL3350407M - OL571739M - OL15363773M - OL6833632M - OL3995654M - OL3986830M - OL6833902M - OL14530741M - OL14538290M - OL3996134M - OL6833140M - OL100136M - OL17674787M - OL4016390M - OL3995917M - OL17716660M - OL477378M
- Online Computer Library Center (OCLC) ID: 45544837 - 20402263 - 39980899 - 50749371 - 24153147
- Library of Congress Control Number (LCCN): ➤ 2001387097 - 00328711 - 99214381 - 2001337551 - 2001315871 - 00327399 - 00328215 - 2001337869 - 2004368656 - 2001337144 - 2001337881 - 98203144 - 96157993
Author's Alternative Names:
"General Accountability Office (U.S.)", "U.S. General Accounting Office", "U.S. General Accounting Office.", "United States General Accounting Office.", "United States General Accounting Office ", "United States. General Accounting Office.", "United States. General of Accounting Office.", "General Accounting Office.", "General Accounting Office (U.S.)", "United States. General Accounting OFfice." and "U S. General Accounting Office",Access and General Info:
- First Year Published: 1987
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
4Security without Obscurity
By Jeff Stapleton

“Security without Obscurity” Metadata:
- Title: Security without Obscurity
- Author: Jeff Stapleton
- Language: English
- Number of Pages: Median: 236
- Publisher: ➤ Auerbach Publishers, Incorporated - Auerbach Publications - Taylor & Francis Group - CRC Press LLC
- Publish Date: 2016 - 2018 - 2021
“Security without Obscurity” Subjects and Themes:
- Subjects: ➤ Telecommunication - Data encryption (computer science) - Computer network architectures - Security measures - Data encryption (Computer science) - Télécommunications - Sécurité - Mesures - Chiffrement (Informatique) - Réseaux d'ordinateurs - Architectures - COMPUTERS - Security - Networking - Public key infrastructure (Computer security) - Data protection - Standards - Information technology - Infrastructure à clé publique (Sécurité informatique) - Protection de l'information (Informatique) - Normes - Technologie de l'information
Edition Identifiers:
- The Open Library ID: ➤ OL36216520M - OL37638203M - OL33824895M - OL36228799M - OL37982682M - OL34620771M - OL36747222M - OL33824616M - OL36755710M - OL27349027M - OL33824890M - OL37980814M - OL33824623M - OL37983527M
- Online Computer Library Center (OCLC) ID: 951429268 - 1044733855
- All ISBNs: ➤ 9780815396413 - 0429467524 - 0815396414 - 1498788211 - 9780429884870 - 9780429884887 - 9780429884894 - 0367708132 - 1498707475 - 9781000349535 - 0429884893 - 9781498788212 - 9781000349597 - 042916033X - 1003041892 - 1000349594 - 100034956X - 9781000349566 - 0429884877 - 1000349535 - 0429884885 - 9780429160332 - 9780429467523 - 9781003041894 - 9780367708139 - 9781498707480 - 9781498707473 - 1498707483
Access and General Info:
- First Year Published: 2016
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Security without Obscurity at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
5Beginning Cryptography with Java
By David Hook

“Beginning Cryptography with Java” Metadata:
- Title: ➤ Beginning Cryptography with Java
- Author: David Hook
- Language: English
- Number of Pages: Median: 484
- Publisher: ➤ Wiley & Sons, Incorporated, John - John Wiley & Sons, Ltd. - Wrox
- Publish Date: 2005 - 2007 - 2008 - 2011
- Publish Location: New York
“Beginning Cryptography with Java” Subjects and Themes:
- Subjects: ➤ Computer Technology - Nonfiction - Java (computer program language) - Computer security - Cryptography - Public key infrastructure (Computer security)
Edition Identifiers:
- The Open Library ID: OL39901609M - OL29103908M - OL29169411M - OL24270449M - OL8052081M
- Online Computer Library Center (OCLC) ID: 59818066 - 164438775
- Library of Congress Control Number (LCCN): 2005011272
- All ISBNs: ➤ 0470309520 - 9780764596339 - 0471757012 - 9781280827549 - 9780471757016 - 0764596330 - 111808022X - 9781118080221 - 9780470309520 - 1280827548
Access and General Info:
- First Year Published: 2005
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Beginning Cryptography with Java at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
6Understanding public-key infrastructure
By Carlisle Adams

“Understanding public-key infrastructure” Metadata:
- Title: ➤ Understanding public-key infrastructure
- Author: Carlisle Adams
- Language: English
- Number of Pages: Median: 308
- Publisher: ➤ Sams - Macmillan Technical Pub.
- Publish Date: 1999
- Publish Location: Indianapolis, IN
“Understanding public-key infrastructure” Subjects and Themes:
- Subjects: ➤ Computer security - Cryptography - Access control - Computer networks - Computers - Security measures - Standards - Computer networks, security measures - Business enterprises, computer networks - Business enterprises - Public key infrastructure (Computer security)
Edition Identifiers:
- The Open Library ID: OL17002568M - OL8755259M
- Library of Congress Control Number (LCCN): 99060204
- All ISBNs: 9781578701667 - 157870166X
Access and General Info:
- First Year Published: 1999
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Understanding public-key infrastructure at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
7Introduction to Certificateless Cryptography
By Hu Xiong

“Introduction to Certificateless Cryptography” Metadata:
- Title: ➤ Introduction to Certificateless Cryptography
- Author: Hu Xiong
- Language: English
- Number of Pages: Median: 314
- Publisher: ➤ Taylor & Francis Group - CRC Press, Taylor & Francis Group
- Publish Date: 2016 - 2020
“Introduction to Certificateless Cryptography” Subjects and Themes:
- Subjects: ➤ Cryptography - Public key infrastructure (Computer security) - Public key cryptography - Identification - Data encryption (Computer science) - Computer networks - Security measures - Infrastructure à clé publique (Sécurité informatique) - Cryptographie à clé publique - Chiffrement (Informatique) - Réseaux d'ordinateurs - Sécurité - Mesures - COMPUTERS - Security
Edition Identifiers:
- The Open Library ID: ➤ OL33603938M - OL33524448M - OL33677505M - OL28820932M - OL33575482M - OL30174705M
- Online Computer Library Center (OCLC) ID: 895728647 - 959278001
- Library of Congress Control Number (LCCN): 2016016910
- All ISBNs: ➤ 1482248611 - 1482248603 - 9781482248609 - 1315355396 - 9781482248616 - 131537269X - 1315336332 - 9780367574567 - 9781315336336 - 9781315372693 - 036757456X - 9781315355399
Access and General Info:
- First Year Published: 2016
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Introduction to Certificateless Cryptography at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
8Policymaking For Critical Infrastructure
By Gordon A. Gow

“Policymaking For Critical Infrastructure” Metadata:
- Title: ➤ Policymaking For Critical Infrastructure
- Author: Gordon A. Gow
- Language: English
- Number of Pages: Median: 212
- Publisher: ➤ Taylor & Francis Group - Ashgate Publishing
- Publish Date: 2005 - 2019 - 2020
“Policymaking For Critical Infrastructure” Subjects and Themes:
- Subjects: ➤ Telecommunication - Security measures - Public key infrastructure (Computer security) - Wireless communication systems - BUSINESS & ECONOMICS / Industries / Media & Communications - TECHNOLOGY & ENGINEERING / Telecommunications
Edition Identifiers:
- The Open Library ID: ➤ OL29445270M - OL34689280M - OL7990859M - OL38315775M - OL29445227M - OL38315769M
- Online Computer Library Center (OCLC) ID: 1103918853
- All ISBNs: ➤ 9781351151573 - 1138620181 - 1351151584 - 1351151606 - 1351151576 - 9781351151603 - 9780754643456 - 075464345X - 1351151592 - 9781351151597 - 9781138620186 - 9781351151580
First Setence:
"The risk of local accidents escalating rapidly into nationwide critical incidents is perhaps nowhere more acute than in advanced industrial societies, where telecommunications continue to foster a complex integration of social institutions with large technological systems."
Access and General Info:
- First Year Published: 2005
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Policymaking For Critical Infrastructure at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
9Public key infrastructure
By John R. Vacca

“Public key infrastructure” Metadata:
- Title: Public key infrastructure
- Author: John R. Vacca
- Language: English
- Number of Pages: Median: 406
- Publisher: ➤ Auerbach Publishers, Incorporated - Taylor & Francis Group - AUERBACH
- Publish Date: 2004 - 2019
“Public key infrastructure” Subjects and Themes:
- Subjects: ➤ Computer security - Computer networks - Security measures - Public key infrastructure (Computer security) - Web services - Infrastructure (economics)
Edition Identifiers:
- The Open Library ID: ➤ OL33454862M - OL34668035M - OL37982475M - OL37980838M - OL34716611M - OL8258751M
- Library of Congress Control Number (LCCN): 2003070898
- All ISBNs: ➤ 9780849308222 - 0849308224 - 9780367394325 - 1280216328 - 0429210019 - 1135517037 - 9780429210013 - 9781135516994 - 1135516995 - 0367394324 - 9781280216329 - 9781135517038
First Setence:
"Protecting the private keys that are tied to a digital certificate's public key, especially those keys that are used to sign lower-level digital certificates, is very serious business under any PKI uses."
Access and General Info:
- First Year Published: 2004
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Public key infrastructure at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
10Trust, privacy, and security in digital business
By Sokratis Katsikas, Javier Lopez and Günther Pernul

“Trust, privacy, and security in digital business” Metadata:
- Title: ➤ Trust, privacy, and security in digital business
- Authors: Sokratis KatsikasJavier LopezGünther Pernul
- Language: English
- Number of Pages: Median: 228
- Publisher: ➤ Springer International Publishing AG - Springer - Springer London, Limited
- Publish Date: ➤ 2005 - 2007 - 2008 - 2010 - 2016
“Trust, privacy, and security in digital business” Subjects and Themes:
- Subjects: ➤ Public key infrastructure (Computer security) - Electronic commerce - Computer networks - Data transmission systems - Business enterprises - Congresses - Computer security - Security measures - Business, computer programs - Computer networks, security measures - Management
Edition Identifiers:
- The Open Library ID: ➤ OL37141035M - OL37122144M - OL37121696M - OL36706493M - OL34540019M - OL9055819M
- Online Computer Library Center (OCLC) ID: 1058195060 - 61386649
- Library of Congress Control Number (LCCN): 2005930335
- All ISBNs: ➤ 9783642151521 - 9783540317968 - 9783540282242 - 9783540744092 - 3540317961 - 9783540857358 - 3319443402 - 9783319443409 - 3540744096 - 3540282246 - 3642151523 - 3540857354
Access and General Info:
- First Year Published: 2005
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Trust, privacy, and security in digital business at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
11PKI
By Andrew Nash, Bill Duane, Derek Brink and Celia Joseph

“PKI” Metadata:
- Title: PKI
- Authors: Andrew NashBill DuaneDerek BrinkCelia Joseph
- Language: English
- Number of Pages: Median: 513
- Publisher: ➤ McGraw-Hill/OsborneMedia - McGraw-Hill Professional Publishing - Osborne/McGraw-Hill
- Publish Date: 2001
- Publish Location: New York
“PKI” Subjects and Themes:
- Subjects: ➤ Computer networks - Security measures - Public key infrastructure (Computer security) - Computer security - Public key cryptography - Computers - Access control - COMPUTERS - Internet - Security - Networking - General - Public-Key-Infrastruktur
Edition Identifiers:
- The Open Library ID: OL7302270M - OL49512856M - OL3967353M
- Online Computer Library Center (OCLC) ID: 46823825 - 50553553
- Library of Congress Control Number (LCCN): 2001273315
- All ISBNs: 0072131233 - 0072192267 - 9780072192261 - 9780072131239
Access and General Info:
- First Year Published: 2001
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find PKI at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
12Understanding PKI
By Carlisle Adams, Carlisle Adams and Steve Lloyd

“Understanding PKI” Metadata:
- Title: Understanding PKI
- Authors: Carlisle AdamsCarlisle AdamsSteve Lloyd
- Language: English
- Number of Pages: Median: 352
- Publisher: ➤ Pearson Education, Limited - Addison-Wesley Professional - Addison-Wesley
- Publish Date: 2002 - 2003
- Publish Location: Boston
“Understanding PKI” Subjects and Themes:
- Subjects: ➤ Computer networks - Security measures - Business enterprises - Public key infrastructure (Computer security) - Data security & data encryption - Network security - Cryptography/Access Control - Computers - Computers - Computer Security - Security - General - Computer Books: General - Networking - General - Computers / Internet / Security - Public key infrastructure (Com - Computer security - Computer networks, security measures - Business enterprises, computer networks - Business enterprises--computer networks--security measures - Computer networks--security measures - Public key infrastructure (computer security) - Qa76.9.a25 a346 2003 - 005.8
Edition Identifiers:
- The Open Library ID: OL21169862M - OL7668473M - OL28998865M
- Online Computer Library Center (OCLC) ID: 50198373
- Library of Congress Control Number (LCCN): 2002074687
- All ISBNs: 9780321743091 - 0672323915 - 0321743091 - 9780672323911
Access and General Info:
- First Year Published: 2002
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Understanding PKI at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
13Windows Server 2008 PKI and certificate security
By Brian Komar

“Windows Server 2008 PKI and certificate security” Metadata:
- Title: ➤ Windows Server 2008 PKI and certificate security
- Author: Brian Komar
- Language: English
- Number of Pages: Median: 768
- Publisher: Microsoft Press
- Publish Date: 2008
- Publish Location: Redmond, WA
“Windows Server 2008 PKI and certificate security” Subjects and Themes:
- Subjects: ➤ Computer networks - Microsoft Windows server - Public key infrastructure (Computer security) - Security measures
Edition Identifiers:
- The Open Library ID: OL34801001M - OL33477207M - OL19330383M - OL20732856M
- Library of Congress Control Number (LCCN): 2008920575
- All ISBNs: ➤ 9780735647275 - 9780735646407 - 0735647275 - 0735646406 - 0735625166 - 9780735625167
Access and General Info:
- First Year Published: 2008
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Windows Server 2008 PKI and certificate security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
14Rethinking Public Key Infrastructures and Digital Certificates
By Stefan A. Brands

“Rethinking Public Key Infrastructures and Digital Certificates” Metadata:
- Title: ➤ Rethinking Public Key Infrastructures and Digital Certificates
- Author: Stefan A. Brands
- Language: English
- Number of Pages: Median: 322
- Publisher: ➤ The MIT Press - The author? - MIT Press
- Publish Date: 1999 - 2000
- Publish Location: Utrecht
“Rethinking Public Key Infrastructures and Digital Certificates” Subjects and Themes:
- Subjects: ➤ Computer network protocols - Computer networks - Security measures - Data encryption (Computer science) - Computer security - Public key infrastructure (Computer security) - Computer networks, security measures - Data encryption (computer science)
Edition Identifiers:
- The Open Library ID: OL53278898M - OL57105059M - OL9530850M
- Online Computer Library Center (OCLC) ID: 44410697
- Library of Congress Control Number (LCCN): 00032866
- All ISBNs: ➤ 0262024918 - 1423725344 - 9780262024914 - 9090130594 - 9781423725343 - 9789090130590
First Setence:
"Individuals and organizations often have a legitimate need to verify the identity or other attributes of the individuals they communicate or transact with."
Access and General Info:
- First Year Published: 1999
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Rethinking Public Key Infrastructures and Digital Certificates at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
15Recommendation for key management
By Elaine B. Barker
“Recommendation for key management” Metadata:
- Title: ➤ Recommendation for key management
- Author: Elaine B. Barker
- Language: English
- Number of Pages: Median: 142
- Publisher: ➤ U.S. Dept. of Commerce, National Institute of Standards and Technology - National Institute of Standards and Technology
- Publish Date: 2007 - 2009 - 2012
- Publish Location: Gaithersburg, MD]
“Recommendation for key management” Subjects and Themes:
- Subjects: ➤ Data encryption (Computer science) - Standards - Public key infrastructure (Computer security)
- Places: United States
Edition Identifiers:
- The Open Library ID: OL53439209M - OL53439207M - OL53439211M
- Online Computer Library Center (OCLC) ID: 812452901 - 812452872 - 812452838
Access and General Info:
- First Year Published: 2007
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Recommendation for key management at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
16PKI
By Tom Austin

“PKI” Metadata:
- Title: PKI
- Author: Tom Austin
- Language: English
- Number of Pages: Median: 270
- Publisher: Wiley
- Publish Date: 2001
- Publish Location: New York
“PKI” Subjects and Themes:
- Subjects: ➤ Computer networks - Public key cryptography - Security measures - Public key infrastructure (Computer security) - Computer security - System analysis - System design - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: OL19697749M
- Online Computer Library Center (OCLC) ID: 45223540
- Library of Congress Control Number (LCCN): 00050453
- All ISBNs: 0471353809 - 9780471353805
Access and General Info:
- First Year Published: 2001
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find PKI at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
17PKI Security Solutions for the Enterprise
By Kapil Raina

“PKI Security Solutions for the Enterprise” Metadata:
- Title: ➤ PKI Security Solutions for the Enterprise
- Author: Kapil Raina
- Language: English
- Number of Pages: Median: 338
- Publisher: ➤ Wiley & Sons, Incorporated, John - John Wiley & Sons
- Publish Date: 2003 - 2008
- Publish Location: Hoboken, NJ
“PKI Security Solutions for the Enterprise” Subjects and Themes:
- Subjects: ➤ Computer networks, security measures - Electronic commerce - Public key infrastructure (Computer security) - Computer networks - Security measures - Infrastructure à clé publique (Sécurité informatique) - Réseaux d'ordinateurs - Sécurité - Mesures - Commerce électronique - COMPUTERS - Internet - Security - Networking - General
Edition Identifiers:
- The Open Library ID: OL25541303M - OL39893769M
- Online Computer Library Center (OCLC) ID: 181841615 - 52630687
- All ISBNs: ➤ 9780470348321 - 128034427X - 0470348321 - 047147035X - 9780471470359 - 9781280344275
Access and General Info:
- First Year Published: 2003
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find PKI Security Solutions for the Enterprise at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
18Public-Key Cryptography – PKC 2013
By Kaoru Kurosawa

“Public-Key Cryptography – PKC 2013” Metadata:
- Title: ➤ Public-Key Cryptography – PKC 2013
- Author: Kaoru Kurosawa
- Language: English
- Number of Pages: Median: 518
- Publisher: ➤ Imprint: Springer - Springer Berlin Heidelberg
- Publish Date: 2013
- Publish Location: Berlin, Heidelberg
“Public-Key Cryptography – PKC 2013” Subjects and Themes:
- Subjects: ➤ Information systems - Systems and Data Security - E-Commerce/e-business - Data protection - Coding theory - Data encryption (Computer science) - Computer Appl. in Administrative Data Processing - Computer science - Data Encryption - Coding and Information Theory - Public key infrastructure (Computer security) - Congresses
Edition Identifiers:
- The Open Library ID: OL27083754M
- Library of Congress Control Number (LCCN): 2013930237
- All ISBNs: 9783642363627 - 3642363628
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Public-Key Cryptography – PKC 2013 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
19Protocols for authentication and key establishment
By Colin Boyd and Anish Mathuria

“Protocols for authentication and key establishment” Metadata:
- Title: ➤ Protocols for authentication and key establishment
- Authors: Colin BoydAnish Mathuria
- Language: English
- Number of Pages: Median: 300
- Publisher: Springer
- Publish Date: 2003
“Protocols for authentication and key establishment” Subjects and Themes:
- Subjects: ➤ Computer network protocols - Computer networks - Security measures - Data encryption (Computer science) - Public key infrastructure (Computer security) - Computers, access control
Edition Identifiers:
- The Open Library ID: OL9057584M
- Online Computer Library Center (OCLC) ID: 52514434
- Library of Congress Control Number (LCCN): 2003054427
- All ISBNs: 9783540431077 - 3540431071
First Setence:
"The newcomer to the subject of cryptographic protocols for authentication and key management is likely to be bemused by the sheer variety of techniques and technical background required."
Access and General Info:
- First Year Published: 2003
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Protocols for authentication and key establishment at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
20PKI

“PKI” Metadata:
- Title: PKI
- Language: English
- Number of Pages: Median: 513
- Publisher: McGraw-Hill/OsborneMedia
- Publish Date: 2001
“PKI” Subjects and Themes:
Edition Identifiers:
- The Open Library ID: OL9256947M
- All ISBNs: 9780072131239 - 0072131233
Access and General Info:
- First Year Published: 2001
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find PKI at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
21PKI uncovered
By Andre Karamanian

“PKI uncovered” Metadata:
- Title: PKI uncovered
- Author: Andre Karamanian
- Language: English
- Number of Pages: Median: 253
- Publisher: Cisco Press
- Publish Date: 2011
- Publish Location: Indianapolis, Ind
“PKI uncovered” Subjects and Themes:
- Subjects: ➤ Computer networks - Computers - Security measures - Public key infrastructure (Computer security) - Access control - Computer security
Edition Identifiers:
- The Open Library ID: OL24906069M
- Online Computer Library Center (OCLC) ID: 741365983
- Library of Congress Control Number (LCCN): 2011002835
- All ISBNs: 1587059169 - 9781587059162
Access and General Info:
- First Year Published: 2011
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find PKI uncovered at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
22Identity-Based Encryption
By Sanjit Chatterjee

“Identity-Based Encryption” Metadata:
- Title: Identity-Based Encryption
- Author: Sanjit Chatterjee
- Language: English
- Number of Pages: Median: 191
- Publisher: ➤ Springer - Springer Science+Business Media, LLC
- Publish Date: 2011 - 2014
- Publish Location: Boston, MA
“Identity-Based Encryption” Subjects and Themes:
- Subjects: ➤ Computational complexity - Coding theory - Computer science - Software engineering - Algebra - Data structures (Computer science) - Data encryption (Computer science) - Public key infrastructure (Computer security) - Public key cryptography - Data encryption (computer science) - Cryptography - Computer security - Discrete Mathematics in Computer Science - Coding and Information Theory - Data Encryption - Cryptology and Information Theory Data Structures
Edition Identifiers:
- The Open Library ID: OL28769794M - OL25562627M
- Online Computer Library Center (OCLC) ID: 712630294
- Library of Congress Control Number (LCCN): 2011924337
- All ISBNs: ➤ 9781489996978 - 1441993827 - 9781441993823 - 1489996974 - 1441993835 - 9781441993830
Access and General Info:
- First Year Published: 2011
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Identity-Based Encryption at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
23Public key infrastructure
By European PKI Workshop (3rd 2006 Turin, Italy)

“Public key infrastructure” Metadata:
- Title: Public key infrastructure
- Author: ➤ European PKI Workshop (3rd 2006 Turin, Italy)
- Language: English
- Number of Pages: Median: 135
- Publisher: Springer
- Publish Date: 2006
- Publish Location: Berlin - New York
“Public key infrastructure” Subjects and Themes:
- Subjects: ➤ Congresses - Data encryption (Computer science) - Computer security - Public key cryptography - Computer networks - Security measures - Public key infrastructure (Computer security)
Edition Identifiers:
- The Open Library ID: OL12774186M - OL18269705M
- Online Computer Library Center (OCLC) ID: 70664227
- Library of Congress Control Number (LCCN): 2006927052
- All ISBNs: 3540351515 - 9783540351511
Access and General Info:
- First Year Published: 2006
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Public key infrastructure at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
24Implementing Pki Services on Z/OS
By IBM Redbooks
“Implementing Pki Services on Z/OS” Metadata:
- Title: ➤ Implementing Pki Services on Z/OS
- Author: IBM Redbooks
- Language: English
- Number of Pages: Median: 358
- Publisher: IBM.Com/Redbooks
- Publish Date: 2004
“Implementing Pki Services on Z/OS” Subjects and Themes:
- Subjects: ➤ Public key infrastructure (Computer security) - Computer networks - Security measures - Z/OS
Edition Identifiers:
- The Open Library ID: OL10607597M
- Online Computer Library Center (OCLC) ID: 829079223
- Library of Congress Control Number (LCCN): 2004266147
- All ISBNs: 0738498742 - 9780738498744
Access and General Info:
- First Year Published: 2004
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Implementing Pki Services on Z/OS at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
25Trust model for security automation data 1.0 (TMSAD)
By Harold Booth
“Trust model for security automation data 1.0 (TMSAD)” Metadata:
- Title: ➤ Trust model for security automation data 1.0 (TMSAD)
- Author: Harold Booth
- Language: English
- Number of Pages: Median: 20
- Publisher: ➤ U.S. Dept. of Commerce, National Institute of Standards and Technology
- Publish Date: 2011
- Publish Location: Gaithersburg, MD
“Trust model for security automation data 1.0 (TMSAD)” Subjects and Themes:
- Subjects: ➤ Computer security - Standards - Public key infrastructure (Computer security)
- Places: United States
Edition Identifiers:
- The Open Library ID: OL53481067M
- Online Computer Library Center (OCLC) ID: 816303475
Access and General Info:
- First Year Published: 2011
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Trust model for security automation data 1.0 (TMSAD) at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
26Trust model for security automation data 1.0 (TMSAD) (draft)
By Harold Booth
“Trust model for security automation data 1.0 (TMSAD) (draft)” Metadata:
- Title: ➤ Trust model for security automation data 1.0 (TMSAD) (draft)
- Author: Harold Booth
- Language: English
- Number of Pages: Median: 19
- Publisher: ➤ U.S. Dept. of Commerce, National Institute of Standards and Technology
- Publish Date: 2011
- Publish Location: Gaithersburg, MD
“Trust model for security automation data 1.0 (TMSAD) (draft)” Subjects and Themes:
- Subjects: ➤ Computer security - Standards - Public key infrastructure (Computer security)
- Places: United States
Edition Identifiers:
- The Open Library ID: OL53481127M
- Online Computer Library Center (OCLC) ID: 816350562
Access and General Info:
- First Year Published: 2011
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Trust model for security automation data 1.0 (TMSAD) (draft) at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
27Recommendation for pair-wise key establishment schemes
By Elaine Baker
“Recommendation for pair-wise key establishment schemes” Metadata:
- Title: ➤ Recommendation for pair-wise key establishment schemes
- Author: Elaine Baker
- Language: English
- Number of Pages: Median: 116
- Publisher: ➤ National Institute of Standards and Technology
- Publish Date: 2008
- Publish Location: Gaithersburg, Md.]
“Recommendation for pair-wise key establishment schemes” Subjects and Themes:
- Subjects: ➤ Data encryption (Computer science) - Public key infrastructure (Computer security) - Computer security - Standards
- Places: United States
Edition Identifiers:
- The Open Library ID: OL43925568M
- Online Computer Library Center (OCLC) ID: 713370528
Access and General Info:
- First Year Published: 2008
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Recommendation for pair-wise key establishment schemes at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
28Recommendation for pair-wise key establishment schemes using integer factorization cryptography
By Elaine B. Barker
“Recommendation for pair-wise key establishment schemes using integer factorization cryptography” Metadata:
- Title: ➤ Recommendation for pair-wise key establishment schemes using integer factorization cryptography
- Author: Elaine B. Barker
- Language: English
- Number of Pages: Median: 114
- Publisher: ➤ National Institute of Standards and Technology
- Publish Date: 2009
- Publish Location: Gaithersburg, Md.]
“Recommendation for pair-wise key establishment schemes using integer factorization cryptography” Subjects and Themes:
- Subjects: ➤ Data encryption (Computer science) - Public key infrastructure (Computer security) - Computer security - Standards
- Places: United States
Edition Identifiers:
- The Open Library ID: OL43925598M
- Online Computer Library Center (OCLC) ID: 713659026
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Recommendation for pair-wise key establishment schemes using integer factorization cryptography at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
29Maintaining and using key history on personal identity verification (PIV) cards
By D. A. Cooper
“Maintaining and using key history on personal identity verification (PIV) cards” Metadata:
- Title: ➤ Maintaining and using key history on personal identity verification (PIV) cards
- Author: D. A. Cooper
- Language: English
- Number of Pages: Median: 10
- Publisher: ➤ U.S. Dept. of Commerce, National Institute of Standards and Technology
- Publish Date: 2010
- Publish Location: Gaithersburg, MD]
“Maintaining and using key history on personal identity verification (PIV) cards” Subjects and Themes:
- Subjects: ➤ Identification - Standards - Identification cards - Public key infrastructure (Computer security) - Data encryption (Computer science) - Computer networks - Security measures
- Places: United States
Edition Identifiers:
- The Open Library ID: OL43988389M
- Online Computer Library Center (OCLC) ID: 816316368
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Maintaining and using key history on personal identity verification (PIV) cards at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
30Public key infrastructure
By European PKI Workshop: Research and Applications (1st 2004 Samos Island, Greece)

“Public key infrastructure” Metadata:
- Title: Public key infrastructure
- Author: ➤ European PKI Workshop: Research and Applications (1st 2004 Samos Island, Greece)
- Language: English
- Number of Pages: Median: 380
- Publisher: Springer
- Publish Date: 2004
- Publish Location: Berlin - New York
“Public key infrastructure” Subjects and Themes:
- Subjects: ➤ Congresses - Public key infrastructure (Computer security) - Computer security
Edition Identifiers:
- The Open Library ID: OL3314937M
- Online Computer Library Center (OCLC) ID: 55807922
- Library of Congress Control Number (LCCN): 2004107465
- All ISBNs: 3540222162 - 9783540222163
Access and General Info:
- First Year Published: 2004
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Public key infrastructure at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
31Public-key cryptography - PKC 2014
By Argentina) International Workshop on Practice and Theory in Public Key Cryptography (17th 2014 Buenos Aires
“Public-key cryptography - PKC 2014” Metadata:
- Title: ➤ Public-key cryptography - PKC 2014
- Author: ➤ Argentina) International Workshop on Practice and Theory in Public Key Cryptography (17th 2014 Buenos Aires
- Language: English
- Number of Pages: Median: 686
- Publisher: Springer
- Publish Date: 2014
- Publish Location: New York - Berlin
“Public-key cryptography - PKC 2014” Subjects and Themes:
- Subjects: ➤ Congresses - Data encryption (Computer science) - Public key infrastructure (Computer security) - Cryptography - Computer science - Data protection - Coding theory - Computer software - Data Encryption - Systems and Data Security - Coding and Information Theory - Algorithm Analysis and Problem Complexity
Edition Identifiers:
- The Open Library ID: OL30388099M
- Online Computer Library Center (OCLC) ID: 880666689
- Library of Congress Control Number (LCCN): 2014932835
- All ISBNs: 9783642546303 - 3642546315 - 3642546307 - 9783642546310
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Public-key cryptography - PKC 2014 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
32Public Key Infrastructure
By Daniel Markwalder
“Public Key Infrastructure” Metadata:
- Title: Public Key Infrastructure
- Author: Daniel Markwalder
- Language: ger
- Number of Pages: Median: 273
- Publisher: Schulthess
- Publish Date: 2009
- Publish Location: Zürich [etc.]
“Public Key Infrastructure” Subjects and Themes:
- Subjects: ➤ Elektronisches Dokument - Public key infrastructure (Computer security) - Geheimnisschutz - Haftung (Privatrecht) - Formvorschrift - Elektronische Signatur - Electronic commerce - Security measures - Law and legislation - Public-key-Kryptosystem - Data protection - Elektronische Unterschrift - Stellvertretung - Computer security - Beweis - Electronic data interchange - Economic aspects - Privatrecht
Edition Identifiers:
- The Open Library ID: OL30496618M
- Library of Congress Control Number (LCCN): 2010517949
- All ISBNs: 9783725558476 - 3725558477
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Public Key Infrastructure at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
33Electronic authentication
“Electronic authentication” Metadata:
- Title: Electronic authentication
- Language: English
- Number of Pages: Median: 205
- Publisher: ➤ eSecurity Task Group, Business Facilitation Steering Group, APEC Telecommunications and Information Working Group
- Publish Date: 2002
- Publish Location: Singapore
“Electronic authentication” Subjects and Themes:
- Subjects: Electronic commerce - Electronic data interchange - Security measures - Public key infrastructure (Computer security)
Edition Identifiers:
- The Open Library ID: OL3740641M
- Online Computer Library Center (OCLC) ID: 53097280
- Library of Congress Control Number (LCCN): 2003411871
- All ISBNs: 9789810476908 - 9810476906
Access and General Info:
- First Year Published: 2002
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Electronic authentication at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
34PKI assessment guidelines
By Katherine Howard
“PKI assessment guidelines” Metadata:
- Title: PKI assessment guidelines
- Author: Katherine Howard
- Language: English
- Number of Pages: Median: 363
- Publisher: American Bar Association
- Publish Date: 2003
“PKI assessment guidelines” Subjects and Themes:
- Subjects: ➤ Computer security - Law and legislation - Public key infrastructure (Computer security) - Computer networks - Security measures - Computers - Access control
- Places: United States
Edition Identifiers:
- The Open Library ID: OL12199471M
- Online Computer Library Center (OCLC) ID: 52862555
- Library of Congress Control Number (LCCN): 2004268456
- All ISBNs: 1570739439 - 9781570739439
Access and General Info:
- First Year Published: 2003
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find PKI assessment guidelines at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
35E-commerce security
“E-commerce security” Metadata:
- Title: E-commerce security
- Language: English
- Number of Pages: Median: 134
- Publisher: ➤ Information Systems Audit and Control Foundation
- Publish Date: 2001
- Publish Location: Rolling Meadows, IL
“E-commerce security” Subjects and Themes:
- Subjects: ➤ Electronic commerce - Security measures - Public key infrastructure (Computer security) - Data protection - Electronic data interchange
Edition Identifiers:
- The Open Library ID: OL31598775M
- Library of Congress Control Number (LCCN): 2004271113
- All ISBNs: 9781893209268 - 1893209261
Access and General Info:
- First Year Published: 2001
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find E-commerce security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
36Gong kai jin yao ji chu jian she yu ping zheng guan li zhong xin =
“Gong kai jin yao ji chu jian she yu ping zheng guan li zhong xin =” Metadata:
- Title: ➤ Gong kai jin yao ji chu jian she yu ping zheng guan li zhong xin =
- Language: chi
- Number of Pages: Median: 164
- Publisher: ➤ Xing zheng yuan guo jia ke xue wei yuan hui ke xue ji shu zi liao zhong xin
- Publish Date: 2003
- Publish Location: Taibei Shi
“Gong kai jin yao ji chu jian she yu ping zheng guan li zhong xin =” Subjects and Themes:
- Subjects: ➤ Electronic commerce - Security measures - Public key infrastructure (Computer security) - Internet
Edition Identifiers:
- The Open Library ID: OL23179371M
- Library of Congress Control Number (LCCN): 2008438812
- All ISBNs: 9789576191008 - 9576191009
Access and General Info:
- First Year Published: 2003
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Gong kai jin yao ji chu jian she yu ping zheng guan li zhong xin = at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
37PKI, unlocking the door to ebusiness
By United States. Dept. of Defense
“PKI, unlocking the door to ebusiness” Metadata:
- Title: ➤ PKI, unlocking the door to ebusiness
- Author: ➤ United States. Dept. of Defense
- Language: English
- Number of Pages: Median: 29
- Publisher: U.S. Dept. of Defense
- Publish Date: 2002
- Publish Location: Washington, D.C
“PKI, unlocking the door to ebusiness” Subjects and Themes:
- Subjects: ➤ United States - Public key infrastructure (Computer security) - Public key cryptography - Electronic commerce - Computer networks - United States. Dept. of Defense - Security measures - United States. Department of Defense
Edition Identifiers:
- The Open Library ID: OL14528619M
- Online Computer Library Center (OCLC) ID: 50900728
Access and General Info:
- First Year Published: 2002
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find PKI, unlocking the door to ebusiness at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
38KMI
“KMI” Metadata:
- Title: KMI
- Language: English
- Publisher: ➤ U.S. National Security Agency, Information Assurance Directorate
- Publish Date: 2002
- Publish Location: [Fort George G. Meade, Md.?]
“KMI” Subjects and Themes:
- Subjects: ➤ United States - United States. National Security Agency/Central Security Service. Information Assurance Directorate - Public key infrastructure (Computer security) - Access control - Computer networks - Computers - Security measures - Information networks
Edition Identifiers:
- The Open Library ID: OL14530610M
- Online Computer Library Center (OCLC) ID: 51686390
Access and General Info:
- First Year Published: 2002
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find KMI at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
39Local resource-based approaches for infrastructure investment
By ILO Sub Regional Office for Southern Africa
“Local resource-based approaches for infrastructure investment” Metadata:
- Title: ➤ Local resource-based approaches for infrastructure investment
- Author: ➤ ILO Sub Regional Office for Southern Africa
- Language: English
- Number of Pages: Median: 155
- Publisher: ILO
- Publish Date: 2010
- Publish Location: Harare
“Local resource-based approaches for infrastructure investment” Subjects and Themes:
- Subjects: ➤ Examinations - Congresses - Public key infrastructure (Computer security) - Computer networks - Study guides - Security measures - Rural planning - Public works - Local level - Labour intensive employment - Developing countries - Rural employment - Road construction - Housing - Impact evaluation - Evaluation technique - Glossary - Africa south of Sahara - Aménagement rural - Travaux publics - Niveau local - Emploi à forte intensité de main-d'oeuvre - Pays en développement - Emploi rural - Construction de routes - Logement - Évaluation de l'impact - Technique d'évaluation - Glossaire - Afrique au sud du Sahara - Planificación rural - Obras públicas - Nivel local - Empleo con alto coeficiente de mano de obra - Países en desarrollo - Empleo rural - Construcción vial - Vivienda - Evaluación del impacto - Técnica de evaluación - Glosario - Africa al sur del Sahara
- Places: Southern Africa - Sub-Regional
Edition Identifiers:
- The Open Library ID: OL24882451M
- Online Computer Library Center (OCLC) ID: 649701545
- Library of Congress Control Number (LCCN): 2010307559
- All ISBNs: ➤ 9221230260 - 9221230279 - 9789221230250 - 9789221230267 - 9789221230274 - 9221230252
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Local resource-based approaches for infrastructure investment at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
40Trust, privacy and security in digital business
By TrustBus 2010 (2010 Bilbao, Spain)

“Trust, privacy and security in digital business” Metadata:
- Title: ➤ Trust, privacy and security in digital business
- Author: ➤ TrustBus 2010 (2010 Bilbao, Spain)
- Language: English
- Number of Pages: Median: 249
- Publisher: Springer
- Publish Date: 2010
- Publish Location: New York - Berlin
“Trust, privacy and security in digital business” Subjects and Themes:
- Subjects: ➤ Public key infrastructure (Computer security) - Datensicherung - Computer networks - Data transmission systems - Electronic commerce - Business enterprises - Congresses - Electronic Commerce - Security measures - Data encryption (Computer science) - Information systems - Computer science - Computer software - Business enterprises, computer networks - Computer networks, security measures
- Places: Bilbao <2010>
Edition Identifiers:
- The Open Library ID: OL25066307M
- Online Computer Library Center (OCLC) ID: 659708138
- Library of Congress Control Number (LCCN): 2010932039
- All ISBNs: 3642151515 - 9783642151514
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Trust, privacy and security in digital business at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
41POLICYMAKING FOR CRITICAL INFRASTRUCTURE: A CASE STUDY ON STRATEGIC INTERVENTIONS IN PUBLIC SAFETY TELECOMMUNICATIONS
By GORDON A. GOW

“POLICYMAKING FOR CRITICAL INFRASTRUCTURE: A CASE STUDY ON STRATEGIC INTERVENTIONS IN PUBLIC SAFETY TELECOMMUNICATIONS” Metadata:
- Title: ➤ POLICYMAKING FOR CRITICAL INFRASTRUCTURE: A CASE STUDY ON STRATEGIC INTERVENTIONS IN PUBLIC SAFETY TELECOMMUNICATIONS
- Author: GORDON A. GOW
- Language: und
- Number of Pages: Median: 198
- Publisher: ASHGATE
- Publish Date: 2005
- Publish Location: ALDERSHOT
“POLICYMAKING FOR CRITICAL INFRASTRUCTURE: A CASE STUDY ON STRATEGIC INTERVENTIONS IN PUBLIC SAFETY TELECOMMUNICATIONS” Subjects and Themes:
- Subjects: Wireless communication systems - Security measures - Telecommunication - Public key infrastructure (Computer security)
Edition Identifiers:
- The Open Library ID: OL22617137M
- Online Computer Library Center (OCLC) ID: 56904906
- Library of Congress Control Number (LCCN): 2004025399
- All ISBNs: 075464345X - 9780754643456
Access and General Info:
- First Year Published: 2005
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find POLICYMAKING FOR CRITICAL INFRASTRUCTURE: A CASE STUDY ON STRATEGIC INTERVENTIONS IN PUBLIC SAFETY TELECOMMUNICATIONS at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
42Public key infrastructure
By European PKI Workshop: Research and Applications (2nd 2005 Canterbury, England)
“Public key infrastructure” Metadata:
- Title: Public key infrastructure
- Author: ➤ European PKI Workshop: Research and Applications (2nd 2005 Canterbury, England)
- Language: English
- Number of Pages: Median: 270
- Publisher: Springer
- Publish Date: 2005
- Publish Location: Berlin
“Public key infrastructure” Subjects and Themes:
- Subjects: ➤ Congresses - Data encryption (Computer science) - Public key infrastructure (Computer security) - Public key cryptography - Computer networks - Computer security - Security measures - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: OL19291512M
- Online Computer Library Center (OCLC) ID: 62614825 - 62346394
- Library of Congress Control Number (LCCN): 2005935450
- All ISBNs: 9783540280620 - 3540280626
Access and General Info:
- First Year Published: 2005
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Public key infrastructure at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
43Public Key Infrastructures, Services and Applications
By Fabio Martinelli

“Public Key Infrastructures, Services and Applications” Metadata:
- Title: ➤ Public Key Infrastructures, Services and Applications
- Author: Fabio Martinelli
- Language: English
- Publisher: Springer Berlin Heidelberg
- Publish Date: 2010
- Publish Location: Berlin, Heidelberg
“Public Key Infrastructures, Services and Applications” Subjects and Themes:
- Subjects: ➤ Information Systems - Data encryption (Computer science) - Computer networks - Computer software - Data protection - Computer science - Congresses - Public key infrastructure (Computer security) - Public-Key-Infrastruktur - Public key cryptography - Security measures - Computer security - Data encryption (computer science) - Cryptography - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: OL27083760M
- Library of Congress Control Number (LCCN): 2010936512
- All ISBNs: 3642164404 - 9783642164408 - 9783642164415 - 3642164412
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Public Key Infrastructures, Services and Applications at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
44Trusted Computing Systeme
By Thomas Müller

“Trusted Computing Systeme” Metadata:
- Title: Trusted Computing Systeme
- Author: Thomas Müller
- Language: ger
- Number of Pages: Median: 160
- Publisher: Springer
- Publish Date: 2008
- Publish Location: Berlin
“Trusted Computing Systeme” Subjects and Themes:
- Subjects: ➤ Networking - Public key infrastructure (Computer security) - Internet - Security - COMPUTERS - Operating systems (Computers) - General - Computer security - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: OL27092977M
- Online Computer Library Center (OCLC) ID: 238785939
- All ISBNs: 3540764097 - 9783540764090 - 3540764100 - 9783540764106
Author's Alternative Names:
"Thomas Muller"Access and General Info:
- First Year Published: 2008
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Trusted Computing Systeme at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
45PKI Security Solutions for the Enterprise
By Kapil Raina

“PKI Security Solutions for the Enterprise” Metadata:
- Title: ➤ PKI Security Solutions for the Enterprise
- Author: Kapil Raina
- Language: English
- Number of Pages: Median: 336
- Publisher: Wiley
- Publish Date: 2003
“PKI Security Solutions for the Enterprise” Subjects and Themes:
- Subjects: ➤ Public key infrastructure (Computer security) - Computer networks - Security measures - Electronic commerce - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: OL7615008M
- Library of Congress Control Number (LCCN): 2002156150
- All ISBNs: 047131529X - 9780471315292
First Setence:
"The hot new buzzword for the twenty-first century is trust."
Access and General Info:
- First Year Published: 2003
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find PKI Security Solutions for the Enterprise at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
46Trust, Privacy and Security in Digital Business
By Simone Fischer-Hübner

“Trust, Privacy and Security in Digital Business” Metadata:
- Title: ➤ Trust, Privacy and Security in Digital Business
- Author: Simone Fischer-Hübner
- Language: English
- Publisher: Springer Berlin Heidelberg
- Publish Date: 2009
- Publish Location: Berlin, Heidelberg
“Trust, Privacy and Security in Digital Business” Subjects and Themes:
- Subjects: ➤ Information Systems - Data encryption (Computer science) - Management information systems - Computer networks - Data protection - Computer science - Public key infrastructure (Computer security) - Congresses - Data transmission systems - Security measures - Electronic commerce - Business enterprises - Business enterprises, computer networks - Computer security - Access control
Edition Identifiers:
- The Open Library ID: OL25539774M
- Online Computer Library Center (OCLC) ID: 428028451
- Library of Congress Control Number (LCCN): 2009932880
- All ISBNs: 364203747X - 9783642037481 - 9783642037474 - 3642037488
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Trust, Privacy and Security in Digital Business at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
47Secure Key Establishment
By Choo

“Secure Key Establishment” Metadata:
- Title: Secure Key Establishment
- Author: Choo
- Language: English
- Publisher: Springer-Verlag US
- Publish Date: 2009
- Publish Location: Boston, MA
“Secure Key Establishment” Subjects and Themes:
- Subjects: ➤ Computer networks, security measures - Computer network protocols - Computer security - Computer networks - Security measures - Public key infrastructure (Computer security)
Edition Identifiers:
- The Open Library ID: OL25538675M
- Online Computer Library Center (OCLC) ID: 299239587
- Library of Congress Control Number (LCCN): 2008935383
- All ISBNs: 0387879692 - 0387879684 - 9780387879680 - 9780387879697
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Secure Key Establishment at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
48Public Key Cryptography – PKC 2009
By Hutchison, David - undifferentiated

“Public Key Cryptography – PKC 2009” Metadata:
- Title: ➤ Public Key Cryptography – PKC 2009
- Author: ➤ Hutchison, David - undifferentiated
- Language: English
- Publisher: Springer Berlin Heidelberg
- Publish Date: 2009
- Publish Location: Berlin, Heidelberg
“Public Key Cryptography – PKC 2009” Subjects and Themes:
- Subjects: ➤ Computer networks - Information Systems - Computer software - Computer science - Data encryption (Computer science) - Computer security - Congresses - Public key cryptography - Public key infrastructure (Computer security)
Edition Identifiers:
- The Open Library ID: OL25542340M
- Online Computer Library Center (OCLC) ID: 310400685
- Library of Congress Control Number (LCCN): 2009921160
- All ISBNs: 9783642004681 - 3642004687 - 9783642004674 - 3642004679
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Public Key Cryptography – PKC 2009 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
49Public Key Infrastructures Services And Applications 8th European Workshop Revised Selected Papers
By Svetla Petkova-Nikova

“Public Key Infrastructures Services And Applications 8th European Workshop Revised Selected Papers” Metadata:
- Title: ➤ Public Key Infrastructures Services And Applications 8th European Workshop Revised Selected Papers
- Author: Svetla Petkova-Nikova
- Publisher: Springer
- Publish Date: 2012
“Public Key Infrastructures Services And Applications 8th European Workshop Revised Selected Papers” Subjects and Themes:
- Subjects: ➤ Public key infrastructure (Computer security) - Congresses - Computer security - Data encryption (computer science) - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: OL25964503M
- Library of Congress Control Number (LCCN): 2012937469
- All ISBNs: 3642298036 - 9783642298035
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Public Key Infrastructures Services And Applications 8th European Workshop Revised Selected Papers at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
50Public key infrastructure

“Public key infrastructure” Metadata:
- Title: Public key infrastructure
- Language: English
- Number of Pages: Median: 380
- Publisher: Springer
- Publish Date: 2004
“Public key infrastructure” Subjects and Themes:
- Subjects: ➤ Congresses - Public key infrastructure (Computer security)
Edition Identifiers:
- The Open Library ID: OL9054792M
- Library of Congress Control Number (LCCN): 2004107465
- All ISBNs: 9783540222163 - 3540222162
First Setence:
"Belgium is planning to be the first European country that distributes Electronic IDentity (EID) cards with digital signature technology to all its citizens."
Access and General Info:
- First Year Published: 2004
- Is Full Text Available: Yes
- Is The Book Public: Yes
- Access Status: Public
Online Access
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Public key infrastructure at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.