Suggested Topics within your search.
Suggested Topics within your search.
- Public key infrastructure (Computer security)
- Security measures 54
- Computer networks 47
- Computer security 26
- Data encryption (Computer science) 25
- Standards 16
- Electronic commerce 15
- Public key cryptography 15
- Business enterprises 11
- Data transmission systems 9
- Web services 5
- Access control 4
- Computers 4
- Data protection 4
- Information technology 4
- Administrative agencies 3
- Computer network protocols 3
- Cryptography 3
- Electronic data interchange 3
- Telecommunication 3
- Cyberterrorism 2
- Identification 2
- Java (Computer program language) 2
- Prevention 2
- Wireless communication systems 2
- CU Boulder 1
- Digital signatures 1
- Federal government 1
- Government communication systems 1
- Government policy 1
-
1
Recommendation for key management. application-specific key management guidance /
Published 2008Online Access
Online Access
Government Document Electronic eBook -
2
Security without obscurity. : A guide to PKI operations /
Published 2024Full Text (via Taylor & Francis)
Electronic eBook -
3
Security without obscurity : a guide to PKI operations /
Published 2024Full Text (via O'Reilly/Safari)
eBook -
4
z/OS PKI Services : quick set-up for multiple CAs /
Published 2016Full Text (via O'Reilly/Safari)
eBook -
5
Windows Server 2008 PKI and certificate security /
Published 2008Full Text (via O'Reilly/Safari)
eBook -
6
Securing information and communications systems principles, technologies, and applications /
Published 2008Full Text (via IEEE)
Electronic eBook -
7
-
8
-
9
Security without obscurity : a guide to PKI operations /
Published 2015Full Text (via O'Reilly/Safari)
eBook -
10
-
11
-
12
-
13
-
14
-
15
Critical infrastructure protection improving information sharing with infrastructure sectors : report to congressional requesters /
Published 2004Full Text (via ProQuest)
Government Document Electronic eBook -
16
Critical infrastructure protection : improving information sharing with infrastructure sectors : report to congressional requesters.
Published 2004Online Access
Online Access
Government Document eBook -
17
Public key infrastructure : examples of risks and internal control objectives associated with certification authorities.
Published 2004Connect to online resource
Connect to online resource
Government Document eBook -
18
Recommendation for pair-wise key establishment schemes using integer factorization cryptography
Published 2009Connect to online resource
Connect to online resource
Government Document Electronic eBook -
19
Recommendation for pair-wise key establishment schemes using integer factorization cryptography /
Published 2008Connect to online resource
Connect to online resource
Government Document Electronic eBook -
20