نتایج جستجو
Buku Putih NU-PKI BENTURAN NU-PKI 1948 -1965 oleh Tim PBNU
Abdul Mun’im D. Z., 2013
Using ArcMap: ArcGIS 9 (Arcgis 9)
ESRI PressESRI Press (Editor)Editors of Esri Press (Editor), 2004
AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility
MadjidNakhjiri, Mahsa Nakhjiri, 2005
AAA and network security for mobile access: radius, diameter, EAP, PKI and IP mobility
MadjidNakhjiri, Mahsa Nakhjiri, 2005
AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility
MadjidNakhjiri, Mahsa Nakhjiri, 2005
Public Key Infrastructure: 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007. Proceedings
Ulrich Flegel, Michael Meier (auth.), Javier Lopez, Pierangela Samarati, Josep L. Ferrer (eds.), 2007
Public Key Infrastructure: 5th European PKI Workshop: Theory and Practice, EuroPKI 2008 Trondheim, Norway, June 16-17, 2008 Proceedings
Peter Landrock (auth.), Stig F. Mjølsnes, Sjouke Mauw, Sokratis K. Katsikas (eds.), 2008
Public Key Infrastructure: Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers
Tobias Straub, Thilo-Alexander Ginkel, Johannes Buchmann (auth.), David Chadwick, Gansen Zhao (eds.), 2005
Public Key Infrastructure: Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006. Proceedings
Jon Ølnes, Leif Buene (auth.), Andrea S. Atzeni, Antonio Lioy (eds.), 2006
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)
Andre Karamanian, Srinivas Tenneti, Francois Dessart, 2011
Основы технологии PKI
Горбатов В. С, 2004
Основы технологии PKI
В. С. Горбатов, 2004
Microsoft® Windows Server™ 2003 PKI and Certificate Security
Brian Komar, 2004
Windows Server 2008 PKI and Certificate Security
Brian Komar, 2008
Windows Server 2008 PKI and Certificate Security (PRO-Other)
Brian Komar, 2008
Windows Server 2008 PKI and Certificate Security (PRO-Other)
Brian Komar, 2008
Implementing SSL / TLS Using Cryptography and PKI
Joshua Davies, 2011
Implementing SSL/TLS Using Cryptography and PKI
Joshua Davies(auth.), 2011

مقالات ISI مرتبط

