Introduces the concepts of public key infrastructure design and policy and discusses use of the technology for computer network security in the business environment.
Steve Lloyd Ordre des livres

- 2003

Introduces the concepts of public key infrastructure design and policy and discusses use of the technology for computer network security in the business environment.