Narrow your search

Library

KU Leuven (50)

ULiège (31)

ULB (30)

Odisee (28)

Thomas More Kempen (28)

Thomas More Mechelen (28)

UCLL (28)

VIVES (28)

VDIC (12)

UGent (4)

More...

Resource type

book (60)

periodical (1)


Language

English (60)

French (1)


Year
From To Submit

2023 (1)

2022 (1)

2020 (1)

2019 (1)

2018 (1)

More...
Listing 1 - 10 of 61 << page
of 7
>>
Sort by

Book
PKI implementation and infrastructures
Author:
ISBN: 100336067X 100336067X 100084496X 1000844951 Year: 2023 Publisher: Boca Raton, FL : CRC Press, Taylor & Francis Group,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book explores all the aspects of implementing and maintaining a PKI and reflects decades of hard won experience in PKI, IT, business, government agencies and academia alike. This is the ONE book on PKI that you have to have on your shelf, whether you be a company director, IT Manager, Government Minister or teacher of IT.

Understanding PKI : concepts, standards, and deployment considerations
Authors: ---
ISBN: 9780672323911 0672323915 Year: 2003 Publisher: Boston, Mass.: Addison-Wesley,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Recommendation for key management.
Authors: ---
Year: 2007 Publisher: [Gaithersburg, MD] : National Institute of Standards and Technology,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Recommendation for key management. : application-specific key management guidance
Authors: ---
Year: 2008 Publisher: [Gaithersburg, MD] : U.S. Dept. of Commerce, National Institute of Standards and Technology,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Trust model for security automation data 1.0 (TMSAD) (draft)
Authors: --- ---
Year: 2011 Publisher: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Information technology : the Bureau of the Public Debt's certificate policy should be updated.
Author:
Year: 2002 Publisher: [Washington, D.C.] : Office of Inspector General, Dept. of the Treasury,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Trust model for security automation data 1.0 (TMSAD)
Authors: --- ---
Year: 2011 Publisher: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Critical infrastructure protection : improving information sharing with infrastructure sectors : report to congressional requesters.
Author:
Year: 2004 Publisher: [Washington, D.C.] : U.S. General Accounting Office,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Proceedings of the 6th on ASIA Public-Key Cryptography Workshop
Author:
Year: 2019 Publisher: New York, New York : Association for Computing Machinery,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Electronic authentication guideline : recommendations of the National Institute of Standards and Technology
Authors: ---
Year: 2006 Publisher: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Listing 1 - 10 of 61 << page
of 7
>>
Sort by