References
Adams, Carlisle, and Steve Lloyd. “Core PKI Services: Authentication, Integrity, and Confidentiality” (Microsoft TechNet, 2009). http://technet.microsoft.com/en-us/library/cc700808.aspx (accessed May 16, 2010).
Adams, Carlisle, and Steve Lloyd. Understanding PKI: Concepts, Standards, and Deployment Considerations, 2nd ed. New York: Addison-Wesley Professional, 2002.
Allsopp, Wil. Unauthorised Access: Physical Penetration Testing for IT Security Teams. Hoboken, NJ: John Wiley & Sons, 2009.
Austin, Thomas. PKI: A Wiley Tech Brief, 1st ed. New York: John Wiley & Sons, 2000.
Baker, Doris M., Steve Burnett, and H. X. Mel. Cryptography Decrypted, 1st ed. New York: Addison-Wesley Professional, 2000.
Barman, Scott. Writing Information Security ...
Get Access Control, Authentication, and Public Key Infrastructure, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.