1. Virtual Private Networks: Technologies and solutions

by Yuan, Ruixi | Strayer, W. Timothy.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 004.6 YUA] (1).
2. PKI: implementing and managing e-Security

by Nash, Andrew.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2001Availability: Items available for loan: [Call number: 005.8 NAS] (1).
3. Planning for PKI: Best practices guide for deploying public key infrastructure

by Housley, Russ | Polk, Tim.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.8 HOU] (1).
4. Understanding PKI: Concepts, standards and deployment considerations

by Adams, Carlisle | Lloyd, Steve.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2003Availability: Items available for loan: [Call number: 005.8 ADA] (1).
5. PKI security solutions for the enterprise: Solving HIPAA, E-Paper Act and other compliance issues

by Raina, Kapil.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 RAI] (1).
6. Functional encryption

by Ahmad, Khairol Amali Bin | Ahmad, Khaleel | Dulhare, Uma N.

Publisher: Cham : Springer, 2021Availability: Items available for loan: [Call number: 621.382 AHM] (1).

Powered by Koha