References
[bib-1] 2009). http://technet.microsoft.com/en-us/library/cc700808.aspx (accessed May 16, 2010).
and "Core PKI Services: Authentication, Integrity, and Confidentiality" (Microsoft TechNet,[bib-2] Understanding PKI: Concepts, Standards, and Deployment Considerations, 2nd ed. New York: Addison-Wesley Professional, 2002.
, and[bib-3] Unauthorised Access: Physical Penetration Testing for IT Security Teams. Hoboken, NJ: John Wiley & Sons, 2009.
[bib-4] PKI: A Wiley Tech Brief, 1st ed. New York: John Wiley & Sons, 2000.
[bib-5] Cryptography Decrypted, 1st ed. New York: Addison-Wesley Professional, 2000.
, , and[bib-6] ...
Get Access Control, Authentication, and Public Key Infrastructure now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.