Understanding PKI: concepts, standards, and deployment considerations
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boston
Addison-Wesley
2003
|
Ausgabe: | 2. ed. |
Schlagworte: | |
Beschreibung: | Revised ed. of: Understanding public-key infrastructure |
Beschreibung: | XXVIII, 322 S. |
ISBN: | 0672323915 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV014595979 | ||
003 | DE-604 | ||
005 | 20080812 | ||
007 | t | ||
008 | 020724s2003 xxu |||| 00||| eng d | ||
010 | |a 2002074687 | ||
020 | |a 0672323915 |9 0-672-32391-5 | ||
035 | |a (OCoLC)637021384 | ||
035 | |a (DE-599)BVBBV014595979 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-91G |a DE-92 |a DE-355 |a DE-522 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 |2 21 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a DAT 465f |2 stub | ||
100 | 1 | |a Adams, Carlisle |e Verfasser |4 aut | |
245 | 1 | 0 | |a Understanding PKI |b concepts, standards, and deployment considerations |c Carlisle Adams ; Steve Lloyd |
250 | |a 2. ed. | ||
264 | 1 | |a Boston |b Addison-Wesley |c 2003 | |
300 | |a XXVIII, 322 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Revised ed. of: Understanding public-key infrastructure | ||
650 | 7 | |a Coderingstheorie |2 gtt | |
650 | 7 | |a Computerbeveiliging |2 gtt | |
650 | 7 | |a Computernetwerken |2 gtt | |
650 | 4 | |a Unternehmen | |
650 | 4 | |a Business enterprises |x Computer networks |x Security measures | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Public key infrastructure (Computer security) | |
650 | 0 | 7 | |a Public-Key-Infrastruktur |0 (DE-588)4671762-6 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Public-Key-Infrastruktur |0 (DE-588)4671762-6 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Lloyd, Steve |e Sonstige |4 oth | |
700 | 1 | |a Adams, Carlisle |e Sonstige |4 oth | |
999 | |a oai:aleph.bib-bvb.de:BVB01-009920660 |
Datensatz im Suchindex
_version_ | 1804129371106050048 |
---|---|
any_adam_object | |
author | Adams, Carlisle |
author_facet | Adams, Carlisle |
author_role | aut |
author_sort | Adams, Carlisle |
author_variant | c a ca |
building | Verbundindex |
bvnumber | BV014595979 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 276 |
classification_tum | DAT 465f |
ctrlnum | (OCoLC)637021384 (DE-599)BVBBV014595979 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 2. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01626nam a2200493 c 4500</leader><controlfield tag="001">BV014595979</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20080812 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">020724s2003 xxu |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2002074687</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0672323915</subfield><subfield code="9">0-672-32391-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)637021384</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV014595979</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-522</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Adams, Carlisle</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Understanding PKI</subfield><subfield code="b">concepts, standards, and deployment considerations</subfield><subfield code="c">Carlisle Adams ; Steve Lloyd</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston</subfield><subfield code="b">Addison-Wesley</subfield><subfield code="c">2003</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXVIII, 322 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Revised ed. of: Understanding public-key infrastructure</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Coderingstheorie</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computerbeveiliging</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computernetwerken</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Unternehmen</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Public key infrastructure (Computer security)</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Public-Key-Infrastruktur</subfield><subfield code="0">(DE-588)4671762-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Public-Key-Infrastruktur</subfield><subfield code="0">(DE-588)4671762-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lloyd, Steve</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Adams, Carlisle</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-009920660</subfield></datafield></record></collection> |
id | DE-604.BV014595979 |
illustrated | Not Illustrated |
indexdate | 2024-07-09T19:04:04Z |
institution | BVB |
isbn | 0672323915 |
language | English |
lccn | 2002074687 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-009920660 |
oclc_num | 637021384 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM DE-92 DE-355 DE-BY-UBR DE-522 |
owner_facet | DE-91G DE-BY-TUM DE-92 DE-355 DE-BY-UBR DE-522 |
physical | XXVIII, 322 S. |
publishDate | 2003 |
publishDateSearch | 2003 |
publishDateSort | 2003 |
publisher | Addison-Wesley |
record_format | marc |
spelling | Adams, Carlisle Verfasser aut Understanding PKI concepts, standards, and deployment considerations Carlisle Adams ; Steve Lloyd 2. ed. Boston Addison-Wesley 2003 XXVIII, 322 S. txt rdacontent n rdamedia nc rdacarrier Revised ed. of: Understanding public-key infrastructure Coderingstheorie gtt Computerbeveiliging gtt Computernetwerken gtt Unternehmen Business enterprises Computer networks Security measures Computer networks Security measures Public key infrastructure (Computer security) Public-Key-Infrastruktur (DE-588)4671762-6 gnd rswk-swf Public-Key-Infrastruktur (DE-588)4671762-6 s DE-604 Lloyd, Steve Sonstige oth Adams, Carlisle Sonstige oth |
spellingShingle | Adams, Carlisle Understanding PKI concepts, standards, and deployment considerations Coderingstheorie gtt Computerbeveiliging gtt Computernetwerken gtt Unternehmen Business enterprises Computer networks Security measures Computer networks Security measures Public key infrastructure (Computer security) Public-Key-Infrastruktur (DE-588)4671762-6 gnd |
subject_GND | (DE-588)4671762-6 |
title | Understanding PKI concepts, standards, and deployment considerations |
title_auth | Understanding PKI concepts, standards, and deployment considerations |
title_exact_search | Understanding PKI concepts, standards, and deployment considerations |
title_full | Understanding PKI concepts, standards, and deployment considerations Carlisle Adams ; Steve Lloyd |
title_fullStr | Understanding PKI concepts, standards, and deployment considerations Carlisle Adams ; Steve Lloyd |
title_full_unstemmed | Understanding PKI concepts, standards, and deployment considerations Carlisle Adams ; Steve Lloyd |
title_short | Understanding PKI |
title_sort | understanding pki concepts standards and deployment considerations |
title_sub | concepts, standards, and deployment considerations |
topic | Coderingstheorie gtt Computerbeveiliging gtt Computernetwerken gtt Unternehmen Business enterprises Computer networks Security measures Computer networks Security measures Public key infrastructure (Computer security) Public-Key-Infrastruktur (DE-588)4671762-6 gnd |
topic_facet | Coderingstheorie Computerbeveiliging Computernetwerken Unternehmen Business enterprises Computer networks Security measures Computer networks Security measures Public key infrastructure (Computer security) Public-Key-Infrastruktur |
work_keys_str_mv | AT adamscarlisle understandingpkiconceptsstandardsanddeploymentconsiderations AT lloydsteve understandingpkiconceptsstandardsanddeploymentconsiderations |