Planning for PKI : best practices guide for deploying public key infrastructure /Author: Housley, Russ,
Publisher: New York : Wiley,
Date: 2001. This title can be found in 1 Iowa libraries.
Threat assessment of malicious code and human threatsFormat: [electronic resource] /
Author: Bassham, Lawrence E.
Publisher: [Gaithersburg, Md.] : National Institute of Standards and Technology,
Date: [1992] This title can be found in 1 Iowa libraries.
YOU MAY BORROW ITEMS YOU FIND IN THE SILO LOCATOR THROUGH YOUR
LOCAL PUBLIC LIBRARY.
This resource is supported by the Institute of Museum and Library Services under the provisions of the Library Services and Technology Act as administered by State Library of Iowa.