Understanding PKI: concepts, standards, and deployment considerations
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boston, MA [u.a.]
Addison-Wesley
2005
|
Ausgabe: | 2. ed. ; 2. printing |
Schlagworte: | |
Beschreibung: | Revised ed. of: Understanding public-key infrastructure |
Beschreibung: | XXIX, 322 S. graph. Darst. |
ISBN: | 9780321743091 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV039725021 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | t | ||
008 | 111125s2005 xxud||| |||| 00||| eng d | ||
020 | |a 9780321743091 |9 978-0-321-74309-1 | ||
035 | |a (OCoLC)50198373 | ||
035 | |a (DE-599)BVBBV039725021 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-Aug4 | ||
082 | 0 | |a 005.8 |2 21 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Adams, Carlisle |e Verfasser |4 aut | |
245 | 1 | 0 | |a Understanding PKI |b concepts, standards, and deployment considerations |c Carlisle Adams ; Steve Lloyd |
250 | |a 2. ed. ; 2. printing | ||
264 | 1 | |a Boston, MA [u.a.] |b Addison-Wesley |c 2005 | |
300 | |a XXIX, 322 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Revised ed. of: Understanding public-key infrastructure | ||
650 | 7 | |a Coderingstheorie |2 gtt | |
650 | 7 | |a Computerbeveiliging |2 gtt | |
650 | 7 | |a Computernetwerken |2 gtt | |
650 | 4 | |a Unternehmen | |
650 | 4 | |a Business enterprises |x Computer networks |x Security measures | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Public key infrastructure (Computer security) | |
650 | 0 | 7 | |a Public-Key-Infrastruktur |0 (DE-588)4671762-6 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Public-Key-Infrastruktur |0 (DE-588)4671762-6 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Lloyd, Steve |e Sonstige |4 oth | |
999 | |a oai:aleph.bib-bvb.de:BVB01-024573039 |
Datensatz im Suchindex
_version_ | 1804148605332750336 |
---|---|
any_adam_object | |
author | Adams, Carlisle |
author_facet | Adams, Carlisle |
author_role | aut |
author_sort | Adams, Carlisle |
author_variant | c a ca |
building | Verbundindex |
bvnumber | BV039725021 |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)50198373 (DE-599)BVBBV039725021 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 2. ed. ; 2. printing |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01516nam a2200445 c 4500</leader><controlfield tag="001">BV039725021</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">111125s2005 xxud||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780321743091</subfield><subfield code="9">978-0-321-74309-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)50198373</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV039725021</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-Aug4</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Adams, Carlisle</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Understanding PKI</subfield><subfield code="b">concepts, standards, and deployment considerations</subfield><subfield code="c">Carlisle Adams ; Steve Lloyd</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2. ed. ; 2. printing</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston, MA [u.a.]</subfield><subfield code="b">Addison-Wesley</subfield><subfield code="c">2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXIX, 322 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Revised ed. of: Understanding public-key infrastructure</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Coderingstheorie</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computerbeveiliging</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computernetwerken</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Unternehmen</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Public key infrastructure (Computer security)</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Public-Key-Infrastruktur</subfield><subfield code="0">(DE-588)4671762-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Public-Key-Infrastruktur</subfield><subfield code="0">(DE-588)4671762-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lloyd, Steve</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-024573039</subfield></datafield></record></collection> |
id | DE-604.BV039725021 |
illustrated | Illustrated |
indexdate | 2024-07-10T00:09:47Z |
institution | BVB |
isbn | 9780321743091 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-024573039 |
oclc_num | 50198373 |
open_access_boolean | |
owner | DE-Aug4 |
owner_facet | DE-Aug4 |
physical | XXIX, 322 S. graph. Darst. |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | Addison-Wesley |
record_format | marc |
spelling | Adams, Carlisle Verfasser aut Understanding PKI concepts, standards, and deployment considerations Carlisle Adams ; Steve Lloyd 2. ed. ; 2. printing Boston, MA [u.a.] Addison-Wesley 2005 XXIX, 322 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Revised ed. of: Understanding public-key infrastructure Coderingstheorie gtt Computerbeveiliging gtt Computernetwerken gtt Unternehmen Business enterprises Computer networks Security measures Computer networks Security measures Public key infrastructure (Computer security) Public-Key-Infrastruktur (DE-588)4671762-6 gnd rswk-swf Public-Key-Infrastruktur (DE-588)4671762-6 s DE-604 Lloyd, Steve Sonstige oth |
spellingShingle | Adams, Carlisle Understanding PKI concepts, standards, and deployment considerations Coderingstheorie gtt Computerbeveiliging gtt Computernetwerken gtt Unternehmen Business enterprises Computer networks Security measures Computer networks Security measures Public key infrastructure (Computer security) Public-Key-Infrastruktur (DE-588)4671762-6 gnd |
subject_GND | (DE-588)4671762-6 |
title | Understanding PKI concepts, standards, and deployment considerations |
title_auth | Understanding PKI concepts, standards, and deployment considerations |
title_exact_search | Understanding PKI concepts, standards, and deployment considerations |
title_full | Understanding PKI concepts, standards, and deployment considerations Carlisle Adams ; Steve Lloyd |
title_fullStr | Understanding PKI concepts, standards, and deployment considerations Carlisle Adams ; Steve Lloyd |
title_full_unstemmed | Understanding PKI concepts, standards, and deployment considerations Carlisle Adams ; Steve Lloyd |
title_short | Understanding PKI |
title_sort | understanding pki concepts standards and deployment considerations |
title_sub | concepts, standards, and deployment considerations |
topic | Coderingstheorie gtt Computerbeveiliging gtt Computernetwerken gtt Unternehmen Business enterprises Computer networks Security measures Computer networks Security measures Public key infrastructure (Computer security) Public-Key-Infrastruktur (DE-588)4671762-6 gnd |
topic_facet | Coderingstheorie Computerbeveiliging Computernetwerken Unternehmen Business enterprises Computer networks Security measures Computer networks Security measures Public key infrastructure (Computer security) Public-Key-Infrastruktur |
work_keys_str_mv | AT adamscarlisle understandingpkiconceptsstandardsanddeploymentconsiderations AT lloydsteve understandingpkiconceptsstandardsanddeploymentconsiderations |