Introduces the concepts of public key infrastructure design and policy and discusses use of the technology for computer network security in the business environment.
Steve Lloyd Ordine dei libri

- 2003

Introduces the concepts of public key infrastructure design and policy and discusses use of the technology for computer network security in the business environment.