Search preferences
Skip to main search results

Search filters

Product Type

  • All Product Types 
  • Books (3)
  • Magazines & Periodicals (No further results match this refinement)
  • Comics (No further results match this refinement)
  • Sheet Music (No further results match this refinement)
  • Art, Prints & Posters (No further results match this refinement)
  • Photographs (No further results match this refinement)
  • Maps (No further results match this refinement)
  • Manuscripts & Paper Collectibles (No further results match this refinement)

Binding

Collectible Attributes

  • First Edition (No further results match this refinement)
  • Signed (No further results match this refinement)
  • Dust Jacket (No further results match this refinement)
  • Seller-Supplied Images (No further results match this refinement)
  • Not Print on Demand (3)

Language (2)

Price

Custom price range (£)

Free Shipping

  • Free Shipping to United Kingdom (No further results match this refinement)

Seller Location

  • NING YU PENG DENG BIAN ZHU

    Published by Machinery Industry Press, 2000

    ISBN 10: 7111141687 ISBN 13: 9787111141686

    Language: Chinese

    Seller: liu xing, Nanjing, JS, China

    Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

    Contact seller

    £ 11.19 shipping from China to United Kingdom

    Destination, rates & speeds

    Quantity: 1 available

    Add to basket

    paperback. Condition: Good. Ship out in 2 business day, And Fast shipping, Free Tracking number will be provided after the shipment.Paperback. Pub Date :2004-04-01 Pages: 136 Publisher: Machinery Industry Press title: the PKI technology Original Price: 17.00 yuan: Ning Yupeng etc. Edited Press: Machinery Industry Publishing Date :2004-4 -1ISBN: 9787111141686 Words: 219.000 yds: 136 Edition: 1 Binding: Paperback: Weight: Editor's Choice \ t \ t \ t \ t \ t \ t \ t \ t Summary PKI (public key infrastructure) A cryptographic techniques to provide the basis of a complete set of security services for online safety communications platform. Like other infrastructure (electricity. water infrastructure). public key infrastructure is the same for the various security needs of the user. providing a variety of security services. The book is divided into four parts and 10 chapters. The first part of the basis of knowledge. and introduces the concept of the PKI. main content. theoretical basis; second part PKI architecture introduces the problems encountered in the use of the PKI system and service functions. as well as PKI construction; third part PKI technology standards. introduces the existing PKI technology standard system; fourth part is the application of the case. the main existing use of PKI implementation of security protocols. as well as online banking. online securities and electronic tax PKI applications. This book applies to prepare to participate in the National Information Security Education Certification (ISEC) examination personnel. but also for the information industry management department staff. learning and reference PKI construction and operation. IT staff and business people. but also as a tertiary hospital school related professional reference materials and e-government. e-commerce training materials. \ T \ t directory publishing instructions the basics Introduction Chapter 1 Introduction 1.1 What is PKI1.2 Why do we need the theoretical basis of PKI1.3 PKI 1.4 PKI 1.6 Exercises Chapter 2. the existing problems of the Technology Development Status and Trends 1.5 PKI system password and the key 2.1 Cryptography foundation 2.2 symmetric key cryptography 2.2.1 Overview 2.2.2 symmetrical password classification 2.2.3 once a dense garbled the asymmetric key cryptography (One-time pad) 2.3 2.3.1 Overview 2.3.2 classification of asymmetric cryptographic algorithm 2.4 Hash algorithm 2.4.1 Overview 2.4.2 Hash classification algorithm 2.5 encryption and digital signature using a public key algorithm encrypted using the public key algorithm 2.5.2 2.5.1 Digital Signature 2.5.3 full public 2.6.1 Overview 2.6.2 Key life cycle of key encryption and signature 2.6 Key Management 2.7 practice questions on digital certificates and directory services 3.1 Overview of digital certificates 3.1.1 What is a digital certificate 3.1.2 X.509 digital certificates 3.2 Certificate Validation 3.3 digital certificates using the 3.4 digital certificates stored 3.5 digital certificate lifecycle 3.6 3.6.1 Overview 3.6.2 X.500 directory service protocol 3.6.3 LDAP protocol 3.7 Exercises Chapter 4 PKI PKI architecture 4.4 CA 4.5 RA architecture architecture and its components 4.1 General 4.2 CA. RA EE4.3 PKI operation the 4.6 PMI4.7 exercises in Chapter 5 of the actual operation of the PKI system 5.1 cross-team card 5.2 CPS5.3 PKI build 5.3 6.2 of the PKI related legal construction status 6.3 6.1 foreign PKI .1 build PKI 5.3.2 two modes of the two modes compare 5.4 Exercises Chapter 6 PKI involves legal issues related legal construction status how to build a legal system of China's PKI 6.3.1 Legislation consider 6.3.2 covers the third part of the technical standards of the Content 6.4 Exercises Chapter 7 PKI technology standard 7.1 ITU-T X.509 and related standards 7.1.1 Overview 7.1.2 ITU-T X.509 Edition 17.1 .3 ITU-T X.509 Edition 27.1.4 ITU-T X.509 Edition 3 (1997) 7.1.5 ITU-T X.509 Edition 4 (2000) 7.1.6 ITU-T standard 7.2 PKIX series of standards 7.2.2 PKI 7.2.1 PKIX series p.

  • PENG XIAO NING WEI SHU DI ZHU BIAN LIANG XIAO ZHI DENG FU

    ISBN 10: 7113072798 ISBN 13: 9787113072797

    Seller: liu xing, Nanjing, JS, China

    Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

    Contact seller

    £ 11.19 shipping from China to United Kingdom

    Destination, rates & speeds

    Quantity: 3 available

    Add to basket

    paperback. Condition: New. Language:Chinese.Paperback. Publisher: China Railway.

  • paperback. Condition: Good. Figure painting Historical Records Complete Works (1 - Episode 9 missing 78 collectively sold separately).