References

[bib-1] Carlisle, Adams, and Steve Lloyd. "Core PKI Services: Authentication, Integrity, and Confidentiality" (Microsoft TechNet, 2009). http://technet.microsoft.com/en-us/library/cc700808.aspx (accessed May 16, 2010).

[bib-2] Carlisle Adams,, and Steve Lloyd. Understanding PKI: Concepts, Standards, and Deployment Considerations, 2nd ed. New York: Addison-Wesley Professional, 2002.

[bib-3] Wil. Allsopp, Unauthorised Access: Physical Penetration Testing for IT Security Teams. Hoboken, NJ: John Wiley & Sons, 2009.

[bib-4] Thomas. Austin, PKI: A Wiley Tech Brief, 1st ed. New York: John Wiley & Sons, 2000.

[bib-5] Doris M. Baker,, Steve Burnett, and H. X. Mel. Cryptography Decrypted, 1st ed. New York: Addison-Wesley Professional, 2000.

[bib-6] ...

Get Access Control, Authentication, and Public Key Infrastructure now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.