Public Key Infrastructure

Public Key Infrastructure

John R. Vacca

110,19 €
IVA incluido
Disponible
Editorial:
Taylor & Francis Ltd
Año de edición:
2019
Materia
Programación informática/desarrollo de software
ISBN:
9780367394325
110,19 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

By allowing digital signatures to be as valid as handwritten signatures, public key infrastructure (PKI) provides businesses with a quick alternative to the sometimes lengthy process of documentation. Public Key Infrastructure shows programmers and engineers how to build appropriate layers of security throughout the network, letting businesses put to rest concerns of how to protect assets and freeing them to concentrate on adding value for employees, customers, and business partners. The book also takes a close look at what constitutes effective public key infrastructures, why their protection is crucial to success, and some thoughts for consideration prior to implementing custom PKIs.

Artículos relacionados

  • SPARK 2014 Reference Manual
    AdaCore / Altran UK Ltd
    SPARK 2014 is a programming language and a set of verification tools designed to meet the needs of high-assurance software development. SPARK 2014 is based on Ada 2012, both subsetting the language to remove features that defy verification, but also extending the system of contracts and aspects to support modular, formal verification.This manual is available online for free at ...
    Disponible

    19,91 €

  • Software and Intelligent Sciences
    Yingxu Wang
    The junction of software development and engineering combined with the study of intelligence has created a bustling intersection of theory, design, engineering, and conceptual thought. Software and Intelligent Sciences: New Transdisciplinary Findings sits at a crossroads and informs advanced researchers, students, and practitioners on the developments in computer science, theor...
  • Power System Planning Technologies and Applications
    Fawwaz Elkarmi / Nazih Abu Shikhah / Nazih Abu-Shikhah
    Planning is an important function of the management of any business, providing knowledge of future prospects and enabling prudent and appropriate decision-making. Planning is especially critical for power systems, since electricity is a fundamental part of modern societies and many conventional electrical energy resources currently in use are limited. Power System Planning Tech...
  • Concept Parsing Algorithms (CPA) for Textual Analysis and Discovery
    Masha Etkind / Uri Shafrir
    Text analysis tools aid in extracting meaning from digital content. As digital text becomes more and more complex, new techniques are needed to understand conceptual structure. Concept Parsing Algorithms (CPA) for Textual Analysis and Discovery: Emerging Research and Opportunities provides an innovative perspective on the application of algorithmic tools to study unstructured d...
  • Model-Based Design for Effective Control System Development
    Wei Wu
    Control systems are an integral aspect of modern society and exist across numerous domains and applications. As technology advances more and more, the complexity of such systems continues to increase exponentially. Model-Based Design for Effective Control System Development is a critical source of scholarly information on model-centric approaches and implementations for control...
  • Verification, Validation and Testing in Software Engineering
    ...

Otros libros del autor

  • Online Terrorist Propaganda, Recruitment, and Radicalization
    John R. Vacca
    Online Terrorist Propaganda, Recruitment, and Radicalization is most complete treatment of the rapidly growing phenomenon of how terrorists’ online presence is utilized for terrorism funding, communication, and recruitment purposes. The book offers an in-depth coverage of the history of how terrorist groups developed an online presence and capab ...
    Disponible

    136,50 €

  • Security in the Private Cloud
    John R. Vacca
    This comprehensive handbook serves as a professional reference and practitioner’s guide to today’s most complete and concise view of private cloud security. It explores practical solutions to a wide range of private cloud computing security issues. The knowledge imparted will enable readers to determine whether the private cloud security solutio ...
    Disponible

    91,44 €

  • Handbook of Sensor Networking
    John R. Vacca
    This handbook provides a complete professional reference and practitioner’s guide to today’s advanced sensor networking technologies. It focuses on both established and recent sensor networking theory, technology, and practice. Specialists at the forefront of the field address immediate and long-term challenges and explore practical solutions to ...
    Disponible

    87,52 €

  • Security in the Private Cloud
    John R. Vacca
    This comprehensive handbook serves as a professional reference and practitioner’s guide to today’s most complete and concise view of private cloud security. It explores practical solutions to a wide range of private cloud computing security issues. The knowledge imparted will enable readers to determine whether the private cloud security solution is appropriate for their organi...
  • Guide to Wireless Network Security
    John R. Vacca
    A major, comprehensive professional text/reference for designing and maintaining security and reliability. From basic concepts to designing principles to deployment, all critical concepts and phases are clearly explained and presented. Includes coverage of wireless security testing techniques and prevention techniques for intrusion (attacks). An essential resource for wireless ...
    Disponible

    211,42 €

  • Practical Internet Security
    John R. Vacca
    to Internet Security.- Internet Technologies.- Basic Security Issues.- Establishing Your Organization’s Security.- Real Threats That Impact Security.- A Security Policy: The Foundation of Your Protection.- Developing Your Security Policy.- Steps to Take Now.- Responding to Attacks.- Securing the Web Client.- Threats and Vulnerabilities.- Protecting Your Web Browser.- Network In...
    Disponible

    196,85 €